Incident Response: A Choose Your Own Adventure Exercise
When I was a kid, I loved choose your own adventure books. You made decisions and could become a powerful Sho-Gun warrior—or if you chose…
When I was a kid, I loved choose your own adventure books. You made decisions and could become a powerful Sho-Gun warrior—or if you chose…
Two vulnerabilities in the Avada Builder plugin for WordPress, with an estimated one million active installations, allow hackers to read arbitrary files and extract sensitive…
Two critical memory-safety vulnerabilities in PHP’s image-processing functions could allow attackers to leak sensitive heap memory or to execute denial-of-service attacks via specially crafted JPEG…
A newly disclosed Linux kernel vulnerability, dubbed “ssh-keysign-pwn” by Qualys researchers, exposes millions of Linux systems to unauthorized access to sensitive SSH private keys and hashed passwords…
Rocky Linux has introduced a Security Repository that allows the distribution to ship urgent security fixes ahead of upstream Enterprise Linux when public exploit code…
Ravie LakshmananMay 15, 2026Vulnerability / Credential Theft The U.S.Cybersecurity and Infrastructure Security Agency (CISA) on Thursday added a newly disclosed vulnerability impacting Cisco Catalyst SD-WAN…
The UAE Cyber Security Council and Dell Technologies have launched a new chapter in national cyber resilience by establishing a Cybersecurity Centre of Excellence in…
The infamous TeamPCP hacking group that besieged the open source software ecosystem several times over the past half year has released the source code of…
NGINX Rift: an 18-year-old flaw in the world’s most deployed web server just came to light Pierluigi Paganini May 14, 2026 Researchers found a critical…
Although nearly everyone in SaaS alternative Cloudsmith’s recent Artifact Management Report generates SBOMs, only a quarter do that automatically rather than manually or on demand.…
In this edition of our “Employee Spotlight” series, I sat down with Andrea Colon, an Account Executive who sees the human side of cyber warfare…
Hackers have injected credential-stealing malware into newly published versions of node-ipc, a popular inter-process communication package, in a new supply chain attack targeting npm. The…