Security researchers find 34 additional vendors, and 47 devices, affected by the widespread Ripple20 vulnerabilities.Back in June, researchers with security firm JSOF disclosed...
A security engineer and infrastructure engineer with Salesforce share lessons learned from their professional role reversal, and advice for people on both teams.Security...
The CISO for Indiana University Health says simple policies, good communication, and strong authentication go much further than vendor tools in solving security...
Maintaining myriad open source components can be tough. Here's how teams can begin to address open source security and continue to innovate.
Open source...
Attackers could work around an earlier patch and use Microsoft Teams Updater to download binaries and payloads.Security researchers have discovered a way to...
The 2019-2020 program year awarded 327 security researchers through 15 bounty programs, with a largest reward of $200,000.Over the past 12 months, Microsoft...
Confidential Computing is a transformational technology that should be part of every enterprise cloud deployment. It's time to start unlocking the possibilities together.When...
Most attacks were small, but the big ones got bigger than ever, Cloudflare says.The number of network layer–distributed denial-of-service (DDoS) attacks — like...
A series of new reports explains how ransomware attackers are changing techniques and how organizations can spot stealthy criminals.Modern ransomware operators are adopting...