News

The US system to track vulnerabilities is struggling to keep up with its backlog. Experts are scrambling to assemble ...
Discover how CTEM, VM, and ASM work together to enhance cybersecurity, providing real-time visibility and proactive threat ...
Attackers are increasingly targeting APIs while exploiting vulnerabilities and weak security measures, so what should ...
The attack surfaces kept growing, and so did the scope of Singapore cyber defenders Read more at straitstimes.com. Read more ...
USA: The Cybersecurity & Infrastructure Security Agency has issued an advisory notice warning of a cybersecurity vulnerability which could in theory allow malicious actors to control a train's brakes.
The federal cybersecurity agency issued an advisory last week regarding a vulnerability in end-of-train devices that could ...
Healthcare providers are making cybersecurity progress, but serious vulnerabilities remain — especially when it comes to AI governance, third-party risk, and limited budgets. Fortified Health Security ...
New cyber vulnerability poses 'severe risk,' DHS says . The vulnerability is linked to a commonly used piece of software called Log4j. By Jack Date and Luke Barr. December 12, 2021, 8:47 PM.
"Cyber criminals are inherently opportunistic. There need not be an exotic zero-day, or similar vulnerability that 'takes up all the oxygen' in the room," Joshua Aagard, research analyst at ...
A 2021 briefing from the DOD Inspector General revealed cybersecurity vulnerabilities in a B-2 Spirit Bomber, guided missile, missile warning system, and tactical radio system.
US has ‘significant’ cyber vulnerabilities, but a sweeping Russian cyberattack is unlikely By Rob Kuznia , Blake Ellis , Daniel A. Medina , Isabelle Chapman and Bob Ortega , CNN 12 minute read ...
The UK’s National Cyber Security Centre (NCSC) has announced the forming of The Vulnerability Research Initiative (VRI), a ...