Industry and ad hoc coalitions appear poised to help fill the gap created by NIST's decision to cut back on CVE data ...
In embracing device code phishing, attackers trick victims into handing over account access by using a service's legitimate ...
Stopping EDR killers, which employ bring-your-own-vulnerable-driver (BYOVD) attack techniques, is difficult, but not ...
Regulatory differences, interconnected digital ecosystems, and the rise of AI have created a complex supply chain Asian ...
The Maritime Transportation Security Act (MTSA) requires plans to protect OT systems, audits by independent third parties, ...
Attackers can abuse the near-maximum severity flaw in nginx-ui to restart, create, modify, and delete NGINX configuration ...
A Cloud Security Alliance (CSA) paper warns of an "AI vulnerability storm" triggered by the introduction of Anthropic's ...
AI's danger isn't that it's creating new bugs, it's that it's amplifying old ones. On March 10, 2026, Microsoft patched ...
Google, Meta, Microsoft about half the time don't comply with requests to opt out of online tracking per California law ...
Elevation-of-privilege bugs accounted for more than half of the 165 vulnerabilities patched, with two zero-days in that mix.
Quantum computers are coming and they may impact systems in unexpected ways that security teams will need to plan for.
Enterprises breaches make more headlines, while smaller incidents tend to be under-reported, if at all, allowing such ...