Discover the latest resources, game-changing insights and unique perspectives to help solve your toughest security challenges in this new post-pandemic world. With the sudden shift to remote work, we learned the value of being able to adapt. Your cyber security strategies must also change. This virtual event will deliver the valuable information on
Established in 2016 by the Secretary of Defense, and born out of Hack The Pentagon, the Vulnerability Disclosure Program (VDP) operates to strengthen the security of the Department of Defense (DoD) Information Network (DoDIN) by crowdsourcing the discovery of cyber-based vulnerabilities. It is the largest single disclosure program in the world with over
The Samba Team has released security updates to address vulnerabilities in multiple versions of Samba. An attacker could exploit some of these vulnerabilities to take control of an affected system.
Multiple Netgear router models contain vulnerabilities that a remote attacker can exploit to take control of an affected device.
70 percent of mobile and desktop applications that today we use are affected at least by one security flaw that is present in open-source libraries.
A Zoom shareholder has filed a lawsuit against the video-conferencing company for allegedly covering up security vulnerabilities in its app.
Google and Mozilla released new versions of Chrome and Firefox browsers to addressed several high-severity vulnerabilities.
Earlier this week video teleconferencing company Zoom fixed an issue that would have allowed users in Zoom "waiting rooms" to spy on meetings even if they weren't approved to attend them, according to researchers at Toronto-based Citizen Lab.
A study that analyzed all the vulnerability disclosures between 2010 and 2019 found that around 55% of all the security bugs that have been weaponized and exploited in the wild were for two major application frameworks, namely WordPress and Apache Struts.
A researcher has discovered more than 60 vulnerabilities across 20 physical security products, including critical flaws that can be exploited remotely to take complete control of a device.