Get the latest federal technology news delivered to your inbox. Despite goals set last year by the National Institute of Standards and Technology to process a backlog of unanalyzed cybersecurity ...
Network and security vulnerabilities were linked to more than 60% of zero-day exploits targeting enterprise technologies in 2024, according to a recent report from the Google Threat Intelligence Group ...
Vulnerabilities in PDF platforms from Foxit and Apryse could have been exploited for account takeover, data exfiltration, and other attacks.
Keysight Technologies’ Ixia Vision product family has been found to contain critical security vulnerabilities that could allow remote attackers to compromise affected devices. According to a newly ...
The US government has continued to make drastic cuts to budgets and personnel, but one cybersecurity service has at least temporarily avoided the chop. The Common Vulnerabilities and Exposures ...
The U.S. government today extended a contract through which it finances the CVE Program, the cybersecurity industry’s go-to database of software vulnerabilities. The U.S. Cybersecurity and ...
The European Union Agency for Cybersecurity (ENISA) has recently launched the beta of the European Vulnerability Database (EUVD), a new public platform operating alongside, but independently from, the ...
Researcher at DEF CON reveals some critical challenges in widely used SSH protocol and provider recommendations on how to make it better. The Secure Shell (SSH) protocol serves as the backbone of ...
European Vulnerability Database is Live: What This ‘Essential Tool’ Offers Security Experts Your email has been sent The announcement comes after concerns that the US government would stop funding the ...
Built to defend enterprise networks, network edge security devices are becoming liabilities, with an alarming rise in zero-day exploits of what experts describe as basic vulnerabilities. Can the ...