BeyondTrust's cybersecurity experts predict the main global threats for 2024, including advanced AI threats and a rise in subscription-based model risks.
Generative AI tools in the wrong hands are a serious threat, which is why their use must be regulated properly.
SBOMs will be key to dealing with the next big vulnerability and incredibly useful in the fight to minimise the effects of smaller weaknesses.
Researchers have discovered vulnerabilities in the trustworthiness of GPT models, raising concerns about toxic and biased outputs.
Zyxel Networks unveils its first WiFi 7 access point, promising to revolutionise high-density business connectivity.
Global platform provider Vitrana leverages CAST technology to slash its software security vulnerabilities by 66%.
52% of security professionals prefer to accept undiscovered vulnerabilities than work with hackers, HackerOne data shows.
Hackuity, the risk-based vulnerability management provider, has launched Version 2.0 of its platform with major enhancements to support risk prioritisation.
Joint solution closes visibility gaps, optimizing vulnerability management for all managed and unmanaged devices, including IoT, IoMT and OT.
The partnership expands Interactive's cybersecurity offering and strengthens its position as a leader in the technology industry.
Interestingly, only 42% of respondents in Oceania say their organisation conducts a cyber-risk assessment at least annually, compared to 43% in 2022.
Major security flaw, 'Looney Tunables', detected in glibc, threatens Linux distributions, urgent patch recommended.
Synopsys Defensics fuzz testing software is now embedded into Keysight's IoT Security Assessment solution, which reduces costs while speeding up time-to-market.
GOLD MELODY identified as cyber threat group selling access to compromised organisations to other criminals. Active since 2017.
The report reveals that 29% of IoT modules had no security features, exposing them to potential risks and vulnerabilities.
IDC research reveals 1 in 4 European organisations report data security as their biggest obstacle in sharing data and collaborating within their organisation.
Recorded Future's monthly report reveals high-risk vulnerabilities, exploit chains, and zero-day vulnerabilities affecting Microsoft and Ivanti products.
According to the expert, cybercriminals are prospecting for valuable information, exploiting vulnerabilities and forging new techniques.
Winter Vivern cyber group targets European governments using XSS vulnerability of Roundcube Webmail server, as ESET researchers have discovered.
Nearly one-third of security leaders admit to insufficiently robust backup processes manual, and local backups rise.