Have you ever wondered how display monitor software can change various settings like brightness over a simple display cable? As…
Without the right metrics, vulnerability management is pretty pointless. If you’re not measuring, how do you know it’s working? So…
The notorious RansomedVC hacker group has made an announcement – they are putting themselves up for sale. The group, known…
Nearly 8 in 10 small business leaders admit they are anxious about the safety of their company’s sensitive data and…
SolarWinds and its long-time CISO Timothy Brown are set to face US SEC charges, alleging that critical vulnerabilities that led…
We know how frustrating it can be to discover new assets that don’t follow your internal security policies, such as…
Apple has introduced new MacBook Pro and iMac computers and three new chips to power them, with the company saying…
Public exploit code is now available for the critical Cisco IOS XE vulnerability tracked as CVE-2023-20198 that was leveraged as…
Here is a list of all new modules recently added from our community of ethical hackers. You can find a…
Samsung Electronics has flagged a gradual recovery in demand in 2024 after reporting its highest quarterly profit so far this…
As someone working within AppSec or ProdSec security, the scope and responsibilities of your role have likely changed over the…
It’s not unlikely that your team has a sufficient amount of vulnerability data that they must assess, prioritize, and remediate….