The OpenChain standard allows companies of all sizes and in all sectors to adopt the key requirements of a quality open-source compliance program while building trust in the supply chain.
Microsoft has discovered Nimbuspwn — several security vulnerabilities that could allow an attacker to elevate privileges, deploy malware, or carry out other malicious activities.
A proactive approach to zero-day vulnerabilities is conducting threat hunting based on the assumption that the organization has been breached using one or more security vulnerabilities.
While looking into the Wyze Cam security devices, security researchers found several security vulnerabilities that let an outside attacker access the camera feed or execute malicious code to further compromise the device.
Lesson from Log4J: Security vulnerabilities are not just high-profile events like the recently identified Log4J exploit, but rather an ongoing threat on many fronts that need constant attention.