Apache's watchTowr Platform has identified dangerous string interpolation operators that could be abused by attackers. .
New vulnerability found in ABB TotalFlow flow computers and controllers exposes oil and gas utilities to potential attacks.
It links individual vulnerabilities in ransomware operations, helping vulnerability management teams prevent potential cyber extortion events with VulnDB.
GitHub has announced a range of new products designed to accelerate the company's push into major enterprises at its San Francisco event.
Today on 10 Minute IT Jams, we are joined by Erik Costlow, who is the Senior Director of Product Management, Azul.
Azul's Vulnerability Detection, the new SaaS product, continuously detects vulnerabilities in Java applications by eliminating false positives.
Trustwave introduces its new Enterprise Pen Testing offering to meet the testing needs of large organizations with extensive vulnerability identification.
Users don't have to use Internet Explorer for its legacy to have left you vulnerable to LogCrusher and OverLog.
Blue Connections was chosen by The Dempsey Group to provide a Fortinet network security solution to refresh its ageing network infrastructure.
Claroty's Team82 exposes major security vulnerabilities in Siemens PLCs and Dataprobe's PDUs, prompting urgent updates.
Trellix has announced the establishment of the Trellix Advanced Research Center to advance global threat intelligence.
Coding Labs mechanisms allow developers to move from learning to applying secure coding knowledge more efficiently, leading to fewer code vulnerabilities.
The Vectra Protect team identified a post-exploitation opportunity in August, allowing malicious actors to steal valid user credentials from Microsoft Teams.
The Claroty research team (Team82) has found seven vulnerabilities in Dataprobe's iBoot-PDU, the company's intelligent power distribution unit product.
Vulnerability disclosures impacting IoT devices increased by 57% in the first half of 2022 compared to the previous six months.
Check Point Software uncovers vulnerabilities in Xiaomi's mobile payment system, potentially affecting up to 1 billion users. Fixes have been provided.
Tenable has announced additions to Tenable Cloud Security that represent the next step in assessing threats related to cloud vulnerabilities.
The vulnerability disclosure landscape is highly volatile, with unreported vulnerabilities and inaccurate scoring, according to Flashpoint.
Deloitte is expanding its cyber security offerings, with the team from leading cyber consultancy, Hacktive, joining the firm.
The most significant and most exploited cybersecurity vulnerability of any New Zealand organisation is its people.