USA media coverage.
December 30, 2024
Decade-Old Vulnerabilities in Ubuntu's 'needrestart' Utility Exposed
Security BuzzDecember 27, 2024
Deepfakes, Quantum Attacks Loom Over APAC in 2025
Dark ReadingDecember 27, 2024
2025 Cybersecurity Predictions: Not Getting Easier; But There is Hope
SecureWorldDecember 26, 2024
Emerging Threats & Vulnerabilities to Prepare for in 2025
Dark ReadingDecember 20, 2024
New Warning As Self-Deleting Cyberattack Targets Windows, Mac
ForbesDecember 19, 2024
Orgs Scramble to Fix Actively Exploited Bug in Apache Struts 2
Dark ReadingDecember 18, 2024
More task focus, the rise of AI whisperers and improved observability -- AI predictions for 2025
BetaNewsDecember 18, 2024
From Mandate to Milestone: How the OMB Memo 22-09 Redefines Federal Cyber Risk Management
Government TechnologyDecember 18, 2024
Old Exploits, New Threats: How SmokeLoader Continues to Haunt Vulnerable Systems
Security BuzzDecember 17, 2024
The 14 Best Vulnerability Scanning Tools in 2025
Security BoulevardDecember 17, 2024
Top 10 Network Security Monitoring Tools
Security BoulevardDecember 17, 2024
LW ROUNDTABLE — How 2024’s cyber threats will transform the security landscape in 2025
Security BoulevardDecember 17, 2024
27 DDoS-for-Hire Operations Shut Down by Law Enforcement
Security MagazineDecember 12, 2024
Law Enforcement Takes Down ‘DDoS-for-Hire’ Sites in Operation PowerOFF
SC MagazineDecember 10, 2024
Top Dynamic Application Security Testing (DAST) Tools for 2025
Security BoulevardDecember 8, 2024
2024 Pinnacle Awards Winner: Qualys’ Sumedh Thakar
Washington ExecDecember 9, 2024
Russian hacktivists target oil, gas and water sectors worldwide
SC MagazineDecember 5, 2024
Bypass Bug Revives Critical N-Day in Mitel MiCollab
Dark ReadingDecember 5, 2024
Critical Vulnerabilities Found in Veeam Service Provider Console
Security BuzzDecember 4, 2024
Veeam Patches Bugs in VSPC, One Leading to Remote Code Execution
SC MagazineDecember 4, 2024
CISA Warns of Zyxel Firewall Vulnerability Exploited in Attacks
Security WeekDecember 2, 2024
Do You Know What Software Is Running in Your Environment?
CyberWireDecember 2, 2024
Critical Vulnerability Found in Zabbix Network Monitoring Tool
Security WeekDecember 1, 2024
2024 Pinnacle Awards Winners Revealed
Washington ExecNovember 26, 2024
More Than 2,000 Palo Alto Networks Firewalls Compromised
Security MagazineNovember 25, 2024
2000 Un-Patched Palo Alto Firewalls Exploited Via PAN-OS Vulnerabilities
Security BuzzNovember 22, 2024
Easily Exploitable Linux needrestart Utility Flaws Allow Root Access
Linux SecurityNovember 22, 2024
2K Palo Alto Un-Patched Firewalls Hacked Despite Warnings
SC MagazineNovember 22, 2024
Microsoft Highlights Security Exposure Management at Ignite
Dark ReadingNovember 22, 2024
In Other News: Nvidia Fixes Critical Flaw, Chinese Linux Backdoor, New Details in WhatsApp-NSO Lawsuit
SecurityWeekNovember 20, 2024
Ubuntu affected by 10-year-old flaws in needrestart package
SC MagazineNovember 20, 2024
2025 Cybersecurity Predictions by Experts
Global Security MagNovember 20, 2024
Decades-Old Security Vulnerabilities Found in Ubuntu's Needrestart Package
The Hacker NewsNovember 19, 2024
Pinnacle Award Finalist Sumedh Thakar: ‘With Passion and Tenacity, You Can Achieve Anything’
Washington ExecNovember 19, 2024
Ubuntu Linux impacted by decade-old 'needrestart' flaw that gives root
Bleeping ComputerNovember 19, 2024
Microsoft to offer hackers millions in Zero Day Quest event
TechTargetNovember 19, 2024
Helldown Ransomware Evolves to Target VMware Systems via Linux
SC MagazineNovember 18, 2024
BackBox 2025 Predictions: The Future IS Cyber Resilience
VMblogNovember 18, 2024
Report Unveils Cybersecurity Leaks in U.S. Drinking Water Systems
SecureWorldNovember 15, 2024
Drinking Water Systems for 26M Americans Face High Cybersecurity Risks
SC MagazineNovember 14, 2024
Major cyber attacks and data breaches of 2024
Security BoulevardNovember 13, 2024
Amazon's Latest Data Breach a Ripple Effect of MOVEit
SecureWorldDecember 4, 2024
A New Era of Federal Cybersecurity Will Begin With Automated Patching to Meet CISA and FISMA Guidelines
GovLoopNovember 13, 2024
Qualys’ Barbara Huelskamp: Working to narrow the workforce, gender gaps
SC MediaNovember 13, 2024
SC Women in IT Security
SC MediaNovember 12, 2024
Tricked By a CAPTCHA: How Cybercriminals are Using Fake Verifications to Steal Sensitive Data
Security BuzzNovember 12, 2024
Microsoft’s November Patch Tuesday Fixes 91 Vulnerabilities, 4 Zero-Days
HackreadNovember 5, 2024
Tor and Tails Team Up for Better Online Privacy Protections
Linux InsiderOctober 30, 2024
WhiteRabbitNeo: High-Powered Potential of Uncensored AI Pentesting for Attackers and Defenders
Security WeekOctober 29, 2024
Black Basta Group Using QR Codes in Teams Chats for Initial Access
MSSP AlertOctober 24, 2024
Prometei' Botnet Spreads Its Cryptojacker Worldwide
Dark ReadingOctober 15, 2024
Jetpack Patches Critical Bug That Exposed Data on 27M WordPress Sites
SC MagazineOctober 9, 2024
Qualys Debuts Industry's First Risk Operations Center (ROC) in the Cloud
VMblogOctober 10, 2024
Qualys Unfurls Risk Operations Center Platform
Security BoulevardOctober 9, 2024
Qualys Partners Get New Risk Operations Center
Channel FuturesOctober 8, 2024
Apple Releases macOS Patch to Fix Compatibility Issues with Security Tools
SC MagazineOctober 8, 2024
Security Leaders Discuss the New Vulnerability Added to CISA’s Catalog
Security MagazineOctober 4, 2024
Ivanti Confirms Exploitation of an Old Critical Vuln
BankInfoSecurityOctober 4, 2024
Ivanti Confirms Exploitation of an Old Critical Vuln
Gov InfoSecurityOctober 2, 2024
NIST's Security Flaw Database Still Backlogged with 17K+ Unprocessed Bugs. Not Great
The RegisterOctober 21, 2024
The Weaponization-Remediation Crisis: Closing the Gap to Secure U.S. Critical Infrastructure and Systems
GovLoopSeptember 26, 2024
National Cybersecurity Strategy Hinges on Federal Coordination, Cyber Risk Management
CPO MagazineSeptember 19, 2024
Sequoia Update for macOS ‘Broke’ Popular Security Tools
SC MagazineSeptember 19, 2024
Upgrading to MacOS Sequoia? Here's Why You May Want To Hold Off
ZDNETSeptember 19, 2024
Apple’s macOS Sequoia Release Causing Issues For EDR Tools: Reports
CRNSeptember 22, 2024
How AI-informed cybersecurity and risk management strategies can empower federal agencies to tackle complex cyber threats
Federal News NetworkSeptember 10, 2024
US Presidential Debate Targeted by Disinformation Threats
Channele2eSeptember 26, 2024
Warnings on High Severity Linux Printing System Vulnerabilities
SC MagazineSeptember 10, 2024
Hackers Have Sights Set on Four Microsoft Vulnerabilities, CISA Warns
The RecordSeptember 9, 2024
Microsoft September 2024 Patch Tuesday Fixes 79 Flaws, Including 4 Zero-Days
HackreadSeptember 9, 2024
Microsoft Discloses 4 Zero-Days in September Update
Dark ReadingSeptember 9, 2024
Disinformation Reigns Ahead of Harris-Trump Presidential Debate
SC MagazineSeptember 5, 2024
A new malware named “Voldemort” may be a cyber espionage campaign
Security MagazineSeptember 2, 2024
EPSS and vulnerability management: New scoring system shows promise
Security BoulevardSeptember 2, 2024
White House Takes Aim at Internet Security
The Wall Street JournalAugust 30, 2024
New Voldemort Malware Uses Google Sheets to Target Key Sectors Globally
HackreadAugust 29, 2024
Voldemort' Malware Curses Orgs Using Global Tax Authorities
Dark ReadingAugust 28, 2024
Over 500,000 Members of Texas Credit Union Affected by Data Breach
SecureWorldAugust 28, 2024
Breach Exposed Information of More Than 500,000 Credit Union Members
Security MagazineAugust 28, 2024
Do cybersecurity certifications still deliver? Experts share 6 key insights
Security BoulevardAugust 26, 2024
MOVEit Hack Exposed Personal Data of Half Million TDECU Users
Info SecurityAugust 26, 2024
TDECU Data Breach: 500,000+ Members Affected by MOVEit Exploit
HackreadAugust 25, 2024
Texas Dow Employees Credit Union Notifies 500,000 of MOVEit Breach
SC MagazineAugust 20, 2024
Backdoor in RFID Cards for Offices, Hotels Can Lead to Instant Cloning
Security BoulevardAugust 18, 2024
FedRAMP Modernization Guide Still Contains Gaps, Expert Says
Gov InfoSecurityAugust 18, 2024
FedRAMP Modernization Guide Still Contains Gaps, Expert Says
Bank Info SecurityJuly 16, 2024
Void Banshee Group Used ‘Windows Relic’ IE in Phishing Campaign
Security BoulevardAugust 8, 2024
Report reveals 10% increase in the exploitation of old CVEs
Security MagazineAugust 5, 2024
How risk prioritization and automation can shape the future of federal cybersecurity
Federal News NetworkJuly 10, 2024
Void Banshee Group Used ‘Windows Relic’ IE in Phishing Campaign
Security BoulevardJuly 10, 2024
Global Intel Agencies Accuse China of Rampant Government Network Hacking
SecureWorldJuly 7, 2024
Supreme Court Ruling Threatens the Framework of Cybersecurity Regulation
SecurityWeekJuly 2, 2024
Friend or Foe? AI's Complicated Role in Cybersecurity
Dark ReadingJuly 1, 2024
Linux Users Beware: New OpenSSH Vulnerability Could Lead to System Takeover
TechopediaJuly 1, 2024
Over 14M servers may be vulnerable to OpenSSH's regreSSHion RCE flaw. Here's what you need to do
ZDNETJune 30, 2024
Critical OpenSSH vulnerability could affect millions of servers
TechTargetJune 30, 2024
Researchers uncover rare, difficult-to-exploit OpenSSH vulnerability
CyberscoopJune 30, 2024
Urgent: Patch Fixed, Reintroduced OpenSSH Bug, Says Qualys
Data Breach TodayJune 30, 2024
Urgent: Patch Fixed, Reintroduced OpenSSH Bug, Says Qualys
InfoRiskTodayJune 30, 2024
Urgent: Patch Fixed, Reintroduced OpenSSH Bug, Says Qualys
HealthcareInfoSecurityJune 30, 2024
Urgent: Patch Fixed, Reintroduced OpenSSH Bug, Says Qualys
Gov InfoSecurityJune 30, 2024
Urgent: Patch Fixed, Reintroduced OpenSSH Bug, Says Qualys
BankInfoSecurityJune 27, 2024
Cyberattack Rate Surges as Novel Malware Growth Accelerates
Security BoulevardJune 25, 2024
GAO Urges Action to Address Critical Cybersecurity Challenges Facing U.S.
Security BoulevardJune 24, 2024
Cloud-based worm now spews ransomware and cryptominer gloom
SC MediaJune 24, 2024
Securing the Clean Energy Cyber Supply Chain: U.S. DOE's New Framework
SecureWorldJune 23, 2024
LockBit Ransomware Gang Claims Breach of U.S. Federal Reserve
SecureWorldJune 19, 2024
Top 15 Vulnerability Management Tools for Your Business
Security BoulevardJune 2, 2024
Agency Leaders Call Cybersecurity ‘Kitchen Table’ Topic
GovCIOJune 16, 2024
FedRAMP Modernization: Transforming Federal Cybersecurity Through Automation and Risk Management
GovLoopJune 2, 2024
Agency Leaders Call Cybersecurity ‘Kitchen Table’ Topic
GovCIOJune 13, 2024
Chinese Threats Aim for Government Sector
Security BoulevardJune 11, 2024
Black Basta Ransomware Suspected of Exploiting Windows Zero-Day Flaw
SecureWorldJune 11, 2024
Black Basta exploits patched Windows privilege escalation bug
SC MediaJune 11, 2024
Rockwell's ICS Directive Comes as Critical Infrastructure Risk Peaks
Dark ReadingJune 11, 2024
Why Malware Matters Most: 6 Ways to Foil Software Threats Faster
ReversingLabsJune 11, 2024
Why Malware Matters Most: 6 Ways to Foil Software Threats Faster
Security BoulevardJune 11, 2024
Black Basta Ransomware Suspected of Exploiting Windows 0-day Before Patch
HackreadJune 10, 2024
How to combat cyber threats and secure democracy in the digital age
Federal TimesJune 4, 2024
People’s lives are at risk,’: Ascension ransomware attack going on nearly three weeks”.
NBC AustinJune 4, 2024
Ascension electronic health records restored after ransomware attack
NBC AustinJune 3, 2024
9 Best Practices for Leveraging Threat Intelligence in Your Security Operations
ReversingLabsJune 3, 2024
9 Best Practices for Leveraging Threat Intelligence in Your Security Operations
Security BoulevardJune 3, 2024
MIT Report Spotlights Triple Threat Fueling Data Breach Tsunami
SecureWorldJune 2, 2024
Cybersecurity Automation in Healthcare Program Launched by HHS Agency
Security BoulevardMay 29, 2024
Okta says Customer Identity Cloud prone to credential-stuffing attacks
SC MediaMay 30, 2024
Okta alerts customers against new credential-stuffing attacks
CSOMay 15, 2024
Interview: Nayeem Islam On The Need For Vulnerability Scanning “At All Times”
Expert InsightsMay 27, 2024
People’s lives are at risk,’: Ascension ransomware attack going on nearly three weeks
NBC AustinMay 21, 2024
SEC’s $10 Million Fine of NYSE Owner Shows Focus on Cyber Disclosures
The Wall Street JournalMay 22, 2024
Energy Dept. CISO Paints Sobering Portrait of Cyber Readiness
MeriTalkMay 21, 2024
NSA Aims to Boost Cybersecurity for Small Defense Contractors
MeriTalkMay 20, 2024
Qualys expands Enterprise TruRisk Platform capabilities for the government sector
Security Info WatchMay 19, 2024
Securing the 2024 election: a cyber expert weighs in
FOX5May 20, 2024
NGA Official Wary on AI Risk Management Impacts
MeriTalkMay 21, 2024
Rockwell to customers: Remove public-facing ICS devices from internet
SC MediaMay 21, 2024
EPA Issues Urgent Alert for Water Utilities to Enhance Cyber Defenses
SecureWorldMay 20, 2024
Qualys Enterprise TruRisk Platform Now Accelerates Federal Agency’s Zero-Trust Journey with Automated Compliance for OMB M-24-04 and CISA BOD 23-01
Global Security MagMay 20, 2024
Qualys launches CyberSecurity Asset Management 3.0
intelligent cisoMay 9, 2024
Enterprise Cyber Risk: Overcoming the Issue of Siloed Tools
Bank Info SecurityMay 14, 2024
CISA's 'vulnrichment' aims to fix the NVD
ReversingLabsMay 14, 2024
CISA’s ‘vulnrichment’ aims to fix the NVD
Security BoulevardMay 14, 2024
Microsoft fixes exploited Qakbot-delivering 0-day in May Patch Tuesday
SC MediaMay 9, 2024
All in a week’s events: The AI juggernaut hits cybersecurity, open source and IT infrastructure
Silicon AngleMay 9, 2024
Is CISA's Secure by Design Pledge Toothless?
Dark ReadingMay 12, 2024
Here’s What 20 Top Cybersecurity CEOs And CTOs Were Saying At RSA Conference 2024
CRNMay 7, 2024
It May be Time to Review Your Cyber Hygiene
Security MagazineMay 9, 2024
Five Companies That Came To Win This Week
CRNMay 7, 2024
10 Cybersecurity Companies Making Moves At RSAC 2024
CRNMay 9, 2024
We Asked 14 Top Cybersecurity Experts And Leaders What They Are Most Excited About. Here’s What They Told Us.
Expert InsightsMay 6, 2024
Enterprise Cyber Risk: Overcoming the Issue of Siloed Tools
Bank Info SecurityMay 7, 2024
Day Two At RSAC 2024: Insights From Bugcrowd, Huntress, Qualys, And Forescout
Expert InsightsMay 2, 2024
Verizon 2024 Data Breach Report shows the risk of the human element
Security MagazineMay 5, 2024
‘Secure by Design’: Career Opportunities for Tech, Security Pros
Dice InsightsMay 5, 2024
MSSP Market News: Fastly, CyberProof, Google Cloud, Tidal Cyber
MSSP AlertMay 2, 2024
State-Sponsored North Korean Hackers Penetrated South Korean Defense Companies, Stole Sensitive Technical Data
CPO MagazineMay 1, 2024
MSSP Market News: Fortinet, BlackBerry, Qualys
MSSP AlertMay 1, 2024
Flaw in R Creates Supply Chain Security Risks
The New StackApril 28, 2024
Experts weigh in on Omni Hotel ransomware incident
Security MagazineApril 28, 2024
Experts weigh in on the MITRE nation-state cyberattack
Security MagazineApril 30, 2024
NIST Updated Its Cybersecurity Framework. What Does That Mean for Agencies?
FedTech MagazineApril 30, 2024
Verizon’s 2024 Data Breach Investigations Report: 5 key takeaways
SC MagazineApril 29, 2024
DHS: AI-Enhanced Nuclear and Chemical Threats Are Risk to US
Gov InfoSecurityApril 29, 2024
Federal agencies need to rethink culture in the fight against ransomware
NextGovApril 24, 2024
North Korean Hackers Intensify Cyberattacks on South's Arms Industry
SecureWorldApril 25, 2024
Military Tank Manual, 2017 Zero-Day Anchor Latest Ukraine Cyberattack
Dark ReadingApril 24, 2024
Nation-State Hackers Leverage Zero-Day Vulnerabilities to Penetrate MITRE Cybersecurity Research Network
CPO MagazineApril 21, 2024
Addressing GAO's Findings on National Cyber Risk Management Gaps
Federal News NetworkApril 18, 2024
How Unified Attack Surface Management Future Proofs Fed Cyberspace
Federal TimesApril 17, 2024
Hacking the Floodgates: US Dams Face Growing Cyber Threats
Gov InfoSecurityApril 16, 2024
Brute-force attacks surge worldwide, warns Cisco Talos
SC MagazineApril 11, 2024
CISA's Malware Analysis Platform Could Foster Better Threat Intel
Dark ReadingApril 12, 2024
Week that Was for 04.13.24
CyberWireApril 11, 2024
Report finds that only 5% of businesses have a cyber expert
Security MagazineApril 10, 2024
A vulnerability in Linux distributions may allow unauthorized access
Security MagazineApril 9, 2024
After BlackCat, RansomHub tries to Extort Change Healthcare
Medical BuyerApril 8, 2024
Daily Briefing for 04.09.24
CyberWireApril 7, 2024
Change Healthcare Investigates Potential Leak of Patient Data
HIPAA JournalApril 7, 2024
Change Healthcare breach data may be in hands of new ransomware group
SC MagazineApril 3, 2024
‘Latrodectus’ uses sandbox evasion techniques to launch malicious payloads
SC MagazineApril 4, 2024
New Latrodectus Downloader Malware Linked to IcedID and Qbot Creators
HackreadApril 2, 2024
NIST Proposes Public-Private Group to Help with NVD Backlog
Security BoulevardApril 3, 2024
Malicious Latrodectus Downloader Picks Up Where QBot Left Off
Dark ReadingApril 2, 2024
Ransomware, Junk Bank Accounts: Cyber Threats Proliferate in Vietnam
Dark ReadingApril 1, 2024
NIST Wants Help Digging Out of Its NVD Backlog
Dark ReadingApril 1, 2024
Government agencies collaborate on a guide to address DDoS attacks
Security MagazineMarch 31, 2024
XZ Utils Backdoor Implanted in Carefully Executed, Multiyear Supply Chain Attack
Dark ReadingMarch 31, 2024
Cybersecurity Industry Starts Picking Through Malicious XZ Utils Code
Security BoulevardMarch 27, 2024
World Backup Day 2024 on March 31
Disaster Recovery JournalMarch 27, 2024
EPA Warns US Water Systems Vulnerable to a Disruptive Cyber Attack, State Governors Must Do More
CPO MagazineMarch 26, 2024
Expert Commentary: World Backup Day
GLOBAL SECURITY MAGMarch 26, 2024
Flaw in Ray AI framework potentially leaks sensitive data of workloads
SC MediaMarch 27, 2024
Critical infrastructure may be the subject of disruptive cyberattacks
Security MagazineMarch 25, 2024
The Gately Report: Trustwave Partners Get Help Starting Cybersecurity Journeys
Channel FuturesMarch 26, 2024
CISA, FBI Release Comprehensive DDoS Guidance Amid Rising Attacks
SecureWorldMarch 20, 2024
NIST's Vuln Database Downshifts, Prompting Questions About Its Future
Dark ReadingMarch 17, 2024
UnitedHealth Begins Testing Restored Change Healthcare Claims Platform
The Wall Street JournalMarch 17, 2024
The Path to Stronger Cyber Defenses: A Blueprint for State and Local Governments
CPO MagazineMarch 12, 2024
NIST Cybersecurity Framework 2.0: What Tech Professionals Need to Know
Dice InsightsMarch 12, 2024
March Patch Tuesday: Microsoft Fixes Two Critical Hyper-V Flaws
SC MagazineMarch 11, 2024
Microsoft Discloses Critical Hyper-V Flaws in Low-Volume Patch Update
Dark ReadingMarch 11, 2024
5 Things To Know On Microsoft’s ‘Patch Tuesday’ for March 2024
CRNMarch 5, 2024
NIST CSF 2.0: Better Risk Management for the New Era of Supply Chain Security
ReversingLabsMarch 5, 2024
NIST Unveils Cybersecurity Framework 2.0 with Key Upgrades
SecureWorldMarch 4, 2024
National Institute of Standards and Technology (NIST) has released its Cybersecurity Framework (CSF) 2.0
Channel FuturesMarch 1, 2024
ConnectWise ScreenConnect Vulnerabilities: What CIOs Need to Know
InformationWeekFebruary 29, 2024
All SBOMs Are Not Created Equal: How to Make Them Actionable
ReversingLabsFebruary 29, 2024
Industry Reactions to NIST Cybersecurity Framework 2.0: Feedback Friday
SecurityWeekFebruary 29, 2024
BlackCat Eats into Its Nine Lives, Threatens More Attacks on Hospitals
SecureWorldFebruary 29, 2024
NIST Makes it Official: Governance is a Critical Part of Cybersecurity
Cybersecurity DiveFebruary 27, 2024
NIST Publishes Cybersecurity Framework 2.0: 3 Key Takeaways
SC MagazineFebruary 27, 2024
Half of IT Leaders Identify IoT as Security Weak Point
InfosecurityFebruary 20, 2024
20 Coolest Security Operations, Risk And Threat Intelligence Of 2023: The Security 100
CRNFebruary 20, 2024
CEO Outlook: Sumedh Thakar, President & CEO, Qualys
CRNFebruary 19, 2024
6 Best Cloud Security Companies & Vendors in 2024
eSecurity PlanetFebruary 16, 2024
In the evolving cyberwar, China aims to take down our critical infrastructure
SC MagazineFebruary 15, 2024
Microsoft Exchange Server Flaw Exploited as a Zero-Day Bug
Dark ReadingFebruary 15, 2024
Microsoft and OpenAI swept AI chat logs to find hackers. Expect that to become the norm.
NextGovFebruary 14, 2024
Valentine’s Day Scams Woo the Lonely-Hearted
Security BoulevardFebruary 13, 2024
Attackers Exploit Microsoft Security-Bypass Zero-Day Bugs
Dark ReadingFebruary 9, 2024
Qualys Introduces TotalCloud 2.0 with TruRisk Insights to Eliminate Cyber Risk in Cloud and SaaS Applications
Database Trends and ApplicationsFebruary 12, 2024
CISA and other US agencies release advisory on PRC threat actor
Security MagazineFebruary 12, 2024
CISA and Fortinet Warns of New FortiOS Zero-Day Flaws
HackreadFebruary 9, 2024
‘Critical’ Fortinet FortiOS Vulnerability Seeing Exploitation: CISA
CRNFebruary 8, 2024
New HijackLoader Variant Evades Detection, Enhances Persistence
SC MediaFebruary 7, 2024
MSSP Market News: ZeroFox, Clearwater, 1stResponder, Qualys
MSSP AlertFebruary 7, 2024
Qualys Unveils TotalCloud 2.0
DevOps DigestFebruary 7, 2024
Qualys Unveils TotalCloud 2.0
Global Security MagFebruary 5, 2024
How the SEC's Rules on Cybersecurity Incident Disclosure Are Exploited
Dark ReadingJanuary 31, 2024
More Ivanti VPN Zero-Days Fuel Attack Frenzy as Patches Finally Roll
Dark ReadingJanuary 31, 2024
Two new Ivanti bugs discovered as CISA warns of hackers bypassing mitigations
The RecordJanuary 31, 2024
One of two new high-severity bugs in Ivanti exploited in the wild
SC MediaJanuary 31, 2024
GNU C Library Vulnerability Leads to Full Root Access
SecurityWeekJanuary 31, 2024
Critical Flaws Found in GNU C Library, Major Linux Distros at Risk
HackreadJanuary 31, 2024
New Glibc Flaw Grants Attackers Root Access on Major Linux Distros
The Hacker NewsJanuary 29, 2024
Orange Cyberdefense Expands Partnership with Qualys
Global Security MagJanuary 29, 2024
Orange Cyberdefense Expands Partnership with Qualys, Strengthening Managed Cybersecurity Portfolio to Deliver an End-to-End Vulnerability Intelligence Service
VMblogJanuary 30, 2024
New Linux glibc flaw lets attackers get root on major distros
Bleeping ComputerJanuary 24, 2024
6 Best Vulnerability Management Software & Systems in 2024
eSecurity PlanetJanuary 29, 2024
MSSP Market News: Qualys, Orange Cyberdefense, Commvault
MSSP AlertJanuary 22, 2024
Atlassian Confluence Server RCE attacks underway from 600+ IPs
The RegisterJanuary 19, 2024
ColdRiver threat group targeting critical infrastructure with backdoor attacks
SC MediaJanuary 22, 2024
The 20 Coolest Cloud Security Companies Of The 2024 Cloud 100
CRNJanuary 17, 2024
Lock Down the Software Supply Chain With 'Secure by Design'
Dark ReadingJanuary 16, 2024
Androxgh0st malware hackers creating large botnet, CISA and FBI warn
The RecordJanuary 17, 2024
Improving Supply Chain Security, Resiliency
InformationWeekJanuary 16, 2024
What Will It Take to Adopt Secure by Design Principles?
InformationWeekJanuary 10, 2024
Microsoft fixes 48 bugs in January Patch Tuesday, none of them zero-days
SC MediaJanuary 9, 2024
Patch Now: Critical Windows Kerberos Bug Bypasses Microsoft Security
Dark ReadingJanuary 9, 2024
Russian Agents Hacking Residential Surveillance Cameras to Gather Intel in Ukraine
CPO MagazineJanuary 4, 2024
Why red-teaming is crucial to the success of Biden’s executive order on AI
Federal News NetworkJanuary 4, 2024
CISA Warns of Exploited Vulnerabilities in Chrome and Excel Parsing Library
HackreadJanuary 5, 2024
Russia Hacked Residential Cameras in Ukraine to Spy on Air Defense, Critical Infrastructure
SecurityWeekJanuary 4, 2024
Ukraine: Russia hacked webcams to aid missile, drone strikes on Kyiv
SC MediaJanuary 4, 2024
Ep. 118 An update on Zero Trust for the Federal Government
Federal Tech PodcastJanuary 4, 2024
The State of Container Security: 5 Key Steps to Locking Down Your Releases
Security BoulevardJanuary 4, 2024
The State of Container Security: 5 Key Steps to Locking Down Your Releases
ReversingLabsJanuary 3, 2024
CISA Warns Federal Agencies of Exploited Google Chrome and Open-Source Vulnerabilities
The RecordJanuary 3, 2024
CISA Adds Excel, Chrome Flaws to Its Exploited Vulnerabilities Catalog
SC MagazineJanuary 2, 2024
Emsisoft: Ban Ransom Payments to Stop Ransomware Attacks
Channel FuturesFollow us on social media