The U.S. Cybersecurity & Infrastructure Security Agency (CISA) has added three new flaws in its Known Exploited Vulnerabilities (KEV) catalog, including a critical OS command injection impacting Progress Kemp LoadMaster. […]
Ford is investigating allegations that it suffered a data breach after a threat actor claimed to leak 44,000 customer records on a hacking forum. […]
Oracle has fixed an unauthenticated file disclosure flaw in Oracle Agile Product Lifecycle Management (PLM) tracked as CVE-2024-21287, which was actively exploited as a zero-day to download files. […]
Go behind the scenes in our latest Lab Session.
D-Link is warning customers to replace end-of-life VPN router models after a critical unauthenticated, remote code execution vulnerability was discovered that will not be fixed on these devices. […]
Exec posts, Microsoft News, News, Recent News
Putting final touches on tomorrow’s Microsoft Ignite keynote, and the excitement is real! Events like this always bring incredible energy, especially during platform shifts as big as this one. I’ve seen a few in my career, but the scale of this technology and the speed at which it is being diffused stand out. Tune in tomorrow to watch live!
The post Putting final touches on tomorrow’s Microsoft Ignite keynote, and the excitement is real! Events like this always bring incredible energy, especially during platform shifts as big as this one. I’ve seen a few in my career, but the scale of this technology and the speed at which it is being diffused stand out. […]
Microsoft announced today that hotpatching is now also available in preview on Windows 365 and Windows 11 Enterprise 24H2 client devices. […]
The new ‘Helldown’ ransomware operation is believed to target vulnerabilities in Zyxel firewalls to breach corporate networks, allowing them to steal data and encrypt devices. […]
Use Gemini, Pixel, Google Lens and more to plan, prep and party this holiday season.
The Ngioweb botnet, which supplies most of the 35,000 bots in the cybercriminal NSOCKS proxy service, is being disrupted as security companies block traffic to and from the two networks. […]