91% of organizations face vulnerability remediation delays Security Staff April 30, 2025 Vulnerability remediation delays are primarily caused by breakdowns in communication and team collaboration. Read More
Commvault Command Center has a critical security flaw Jordyn Alger April 29, 2025 Commvault Command Center has a critical security flaw. Security leaders discuss. Read More
5 ICS advisories released by CISA, security leaders discuss Jordyn Alger April 28, 2025 CISA warns of flaws in Siemens, Schneider Electric, and ABB hardware.Read More
Verizon 2025 Data Breach Investigations Report shows rise in cyberattacks Jordyn Alger April 25, 2025 Verizon Business has released its 2025 Data Breach Investigations Report. Read More
Devices exposed to remote hacking via Erlang/OTP SSH vulnerability Jordyn Alger April 21, 2025 The Erlang/Open Telecom Platform (OTP) SSH implementation has a critical security vulnerability.Read More
MITRE support extended 11 more months, yet uncertainty remains Security Staff April 17, 2025 Although MITRE’s contact has been extended for 11 more months, uncertainty remains un the cyber community. Read More
MITRE set to lose funding today, CISA intervenes Jordyn Alger April 16, 2025 CISA has extended MITRE’s funding, and security leaders are sharing their thoughts. Read More
Incomplete NVIDIA patch could leave AI infrastructure and data at risk Jordyn Alger April 15, 2025 An incomplete NVIDIA patch could leave AI infrastructure and data at risk. Security leaders share their insights. Read More
Product Spotlight RSA 2025 product preview Taelor Sutherland April 8, 2025 RSA 2025 takes place from April 28 through May 1 in San Francisco, California, bringing together cybersecurity leaders from all over the country. Security magazine highlights a few products from this year’s RSA exhibitors.Read More
Brand impersonation is 51% of browser phishing attempts Security Staff March 20, 2025 A recent Menlo Security report identifies key drivers behind the rise in browser-based attacks, including AI, PhaaS and zero-day vulnerabilities.Read More