Vulnerabilities | News, how-tos, features, reviews, and videos
The OWASP list provides recommendations aimed at getting around lagging indicators such as CVE catalogs and provides security practitioners with a guide to safely using OSS components.
Hacker group Midnight Blizzard utilized password spray attacks that successfully compromised legacy Microsoft emails. Here’s how to reinforce your defenses against these intrusions.
Partitioning decisions in Windows were once mundane with little risk attached. Recent vulnerabilities that allow the bypassing of safety protocols highlight the need to pay more attention to them.
What producers of IoT devices and software need to know about the growing movement to create a cybersecurity rating system similar to the Energy Star program for appliances.
After two decades of regular and indispensable updates, it’s clear that security teams need take a more holistic approach to applying fixes far beyond the Microsoft ecosystem.
Code vulnerability is not only a risk of open-source code, with many legacy systems still in use — whether out of necessity or lack of visibility — the truth is that cybersecurity teams will inevitably need to address the problem.
Threat actors see opportunity when new technology is designed with inadequate security as these recent incidents prove.
CISA’s recommendations for vendors, developers, and end-users promote a more secure software ecosystem.
In cybersecurity’s never-ending cat-and-mouse game with hackers and grifters, the threats are always evolving. Here are some of the main attacks experts see as the biggest and baddest on the horizon.
Attackers are taking advantage of the increased use of QR codes to steal sensitive information or conduct phishing campaigns. Here's what security teams and employees need to know.