Cisco tightens link between observability and security
Cisco has updated its full-stack observability platform with the latest version of Cisco Secure Application, designed to help IT departments secure development and deployment of…
Cisco has updated its full-stack observability platform with the latest version of Cisco Secure Application, designed to help IT departments secure development and deployment of…
Bug Bytes is a weekly newsletter curated by members of the bug bounty community. The second series is curated by InsiderPhD. Every week, she keeps…
Virtual conference will explore cybersecurity use-cases for artificial intelligence (AI) technology and the race to protect LLM algorithms from adversarial use. SecurityWeek will host its…
CVE Number CVE Title Impact Max Severity Tag CVE-2023-4863 Chromium: CVE-2023-4863 Heap buffer overflow in WebP Microsoft Edge (Chromium-based) CVE-2023-41764 Microsoft Office Spoofing Vulnerability Spoofing…
In recent years, Linux systems gained prominence among diverse threat actors, with more than 260,000 unique samples emerging in H1 2023. In the case of…
Enterprise macOS users are being targeted by attackers slinging new information-stealing malware dubbed MetaStealer. The MetaStealer malware MetaStealer is delivered within malicious disk image format…
There is a new battlefield. It is global and challenging to defend. What began with a high-profile incident back in 2007, when Estonia was hit…
A threat actor tracked in Microsoft’s taxonomy as Storm-0324 has been observed switching up its tactics to incorporate social engineering phishing attacks conducted via Microsoft…
On September 11, 2023, MGM Resorts International, a renowned premium destination resort brand in the United States, fell victim to a ransomware attack. The luxury…
German business software maker SAP on Tuesday announced the release of 13 new and five updated security notes as part of its September 2023 Security…
Modern digital transformations have been fuelled by APIs, altering how many businesses and organizations run. However, the recent innovation and digital transformation wave have also…
“In most of these areas, you already have existing statutes that prohibit the behaviors that we want to continue to be prohibited,” Young says. “So…