Discrepancies Discovered in Vulnerability Severity Ratings
Differences in how the National Vulnerability Database (NVD) and vendors score bugs can make patch prioritization harder, study says.
Differences in how the National Vulnerability Database (NVD) and vendors score bugs can make patch prioritization harder, study says.
An OpSec slip from the North Korean threat group helps researchers attribute what was first suspected as a ransomware attack to nation-state espionage.
The average organization does business with 11 third parties, and 98% of organizations do business with a third party who has suffered a breach, an analysis finds.
Killnet is building its profile, inspiring jewelry sales and rap anthems. But the impact of its DDoS attacks, like the ones that targeted 14 major US hospitals this week, remain largely questionable.
Two security holes — one particularly gnarly — could allow hackers the freedom to do as they wish with the popular edge equipment.
Five vulnerabilities in the baseboard management controller (BMC) software used by 15 major vendors could allow remote code execution if attackers gain network access.
Security vulnerabilities in VMwares vRealize Log Insight platform can be chained together to offer a cybercriminals a gaping hole to access corporate crown jewels.
Recent cyberattacks against SMBs across Europe have been traced back to copycat groups using leaked LockBit locker malware.
Everyone on Twitter wants a blue check mark. But Microsoft Azures blue badges are even more valuable to a threat actor stealing your data via malicious OAuth apps.
The incidents are the latest indication of the growing popularity of dangerous disk wipers, created to disrupt and degrade critical infrastructure and other organizations.