Software supply chain attacks present an increasingly worrying threat. According to a recent BlueVoyant study, an impressive 97 percent of companies surveyed have been negatively impacted by a securi...
More than 3.6 million MySQL servers are publicly exposed on the internet, security researchers noted this week.
Shadow Server Foundation researchers reported that they simply issued a MySQL c...
Open source software libraries are frequent targets of hackers, who see them as an attractive path for stealing credentials and distributing malware.
Hundreds of thousands of software project...
Encryption and the development of cryptography have been a cornerstone of IT security for decades and remain critical for data protection against evolving threats.
While cryptology is thousand...
The development of software-defined wide area networking (SD-WAN) has given enterprise administrators flexibility akin to virtualization to manage distributed networks and users globally.
Wide...
The Apache Log4j Log4Shell bug is one of the most critical vulnerabilities in the history of cybersecurity.
Hundreds of millions of devices use the Log4j component for various online services, amo...
The software supply chain is a critical element in the lifecycle of applications and websites. The interdependencies and components common in modern software development can increase the attack surf...
Palo Alto Networks says current zero trust solutions don't go far enough, so today the cybersecurity leader urged the industry to transition to what it's calling Zero Trust Network Access 2.0 (ZTNA ...
Burp is one of the top-rated security suites for pentesting and ethical hacking. While there are paid professional and enterprise editions, you can install the community edition for free and even use...
Databases contain some of the most critical data in enterprises, so vulnerabilities in them are serious issues.
Researchers at Singapore-based cybersecurity company Group-IB recently discovered tho...