Content Paint

cybersecurity

How the NVD backlog highlights the need for context in vulnerability management

"A Vulnerability Operations Centre (VOC) approach can work wonders here..."

True scale of London hospital cyberattack revealed

800 planned operations and 700 outpatient appointments were rearranged following the incident

Microsoft President Brad Smith before a House Committee on Homeland Security.

Says State Department cyber team deserve a medal for spotting intrusion based on Microsoft security issue before Microsoft's own team did.

20,000 Fortinet devices breached by Chinese hackers – reboots, firmware updates no defence

"It is important that organizations practice the ‘assume breach’ principle..." YARA rules, hashes etc. available for defenders.

Arm's GPU kernels are having a bad year for vulnerabilities  in 2024 (Image credit: Isai Ramos, Unsplash)

So far in 2024, Arm has highlighted eight vulns affecting its Bifrost GPU and 10 impacting Valhall.

Network devices now riskier than endpoints, research claims

Study highlights devices which suffer the most vulnerabilities and warns of risks to come - including industrial robots

Mandiant confirms 165 Snowflake breach victims – sees custom .NET and Java reconnaissance tool

“At least 79.7% of the accounts leveraged by the threat actor in this campaign had prior credential exposure

TikTok's EU data migration will be over by Christmas, policy chief reveals

The Chinese giant is “leaning into” European data sovereignty laws as it moves vast quantities of data across the Atlantic

CTO to CISO: Christine Bejerasco on generative AI, and the "loneliness" of security

WithSecure’s Christine Bejerasco says CISOs need more sparring partners

Your link has expired. Please request a new one.
Your link has expired. Please request a new one.
Your link has expired. Please request a new one.
Great! You've successfully signed up.
Great! You've successfully signed up.
Welcome back! You've successfully signed in.
Success! You now have access to additional content.