MITRE releases new list of top 25 most dangerous software bugs
MITRE shared today this year's list of the top 25 most dangerous weaknesses plaguing software during the previous two years.…
MITRE shared today this year's list of the top 25 most dangerous weaknesses plaguing software during the previous two years.…
A sophisticated ransomware attack against a San Jose-based housing advocacy group has impacted over 40,000...
The University of Manchester finally confirmed that attackers behind a cyberattack disclosed in early June had stolen data belonging to alumni…
By Walt Szablowski, Founder and Executive Chairman, Eracent Just a few months ago, the FAA grounded all flights across the…
GHENT, Belgium, June 20, 2023 /PRNewswire/ — After raising $1.4 million in 2022 and successfully launching its product, award-winning Belgian access...
CISOs struggle with the board amidst an economic downturn. By Tim Fleming, Strategic Advisor, Silverfort Cyber risk is now nailed…
By Craig Thole, SVP, Product Development and Operations at Assurant, Inc. While the rise of internet-enabled smart home devices generates…
Threat groups created a fake security company, "High Sierra," with faux exploits and fake profiles for security researchers on GitHub…
By Shambhu Nath Jha, Associate Vice President, Fact.MR Technology has touched every aspect of our lives and became an integral…
By Jaye Tillson, Director of Strategy, Axis Security Evolution of the CISO Role The Chief Information Security Officer (CISO) role…