[eBook] Your First 90 Days as MSSP: 10 Steps to Success
Bad actors continuously evolve their tactics and are becoming more sophisticated. Within the past couple of years, we’ve seen supply chain attacks that quickly...
Bad actors continuously evolve their tactics and are becoming more sophisticated. Within the past couple of years, we’ve seen supply chain attacks that quickly...
Image: Google Google’s Threat Analysis Group has detailed a group it has labelled as Exotic Lily that breached a target and sold off the...
One month after disclosing a data breach that affected roughly 515,000 people, the International Committee of the Red Cross (ICRC) announced that the hackers...
Google’s Project Zero released a report covering its work in 2021. It found that vendors took an average of 52 days to fix reported...
Google’s Project Zero has observed a decrease in the overall time vendors need to address vulnerabilities reported by the bug hunting team. Between 2019...
Chief Information Security Officers (CISOs) are an essential pillar of an organization’s defense, and they must account for a lot. Especially for new CISOs,...
Full Self Driving (FSD) beta software of the TESLA car has been leaked, and it is circulated in and around the network of...
Researchers noticed that threat actors started exploiting Realtek SDK vulnerabilities shortly after their details were made public. Realtek informed customers about the flaws and...
Cybercriminals quickly started exploiting a vulnerability that affects routers and modems from many vendors that use the same underlying firmware. On August 3, cybersecurity...
The latest AppSec Stats Flash report from NTT Application Security has found that the remediation rate for severe vulnerabilities is on the decline, while...