Vulnerabilities like Log4j remain responsible for security breaches a full year after the discovery of the flaw. In the months after widespread reporting about the vulnerability, 40% of Log4j downloads…
Browsing CategoryVulnerability
Don’t Wait To Embrace CISA’s Vulnerability Management Rules
Vulnerability management is the time-consuming process of finding and patching a seemingly unlimited number of potential risks. The National Institute of Standards and Technology (NIST) reports more than 23,000 new…
What the SEC Requires From Businesses After a Data Breach
Consumers have become wary of data breaches and the decreased safety of their personal information. However, the cost of a data breach is no longer only a matter of money…
Call to Patch: Zero Day Discovered in Enterprise Help Desk Platform
In an age where organizations have established a direct dependence on software to run critical business operations, it’s fundamental that they are evaluating their software development lifecycles and that of…
S3 Ep37: Quantum crypto, refunding Bitcoins, and Alpaca problems [Podcast]
Latest episode – listen now!
How to hack a bicycle – Peloton Bike+ rooting bug patched
It’s a bike, Jim, but not as we know it.
ALPACA – the wacky TLS security vulnerability with a funky name
Don’t panic – this isn’t another Heartbleed. But it’s a fascinating reminder of why doing things the easy way isn’t always the best way.
Chrome zero-day, hot on the heels of Microsoft’s IE zero-day. Patch now!
Patch early. Patch often. Patch now!
S3 Ep35: Apple chip flaw, Have I Been Pwned, and Covid tracker trouble [Podcast]
Latest episode – listen now!
“Unpatchable” vuln in Apple’s new Mac chip – what you need to know
It’s all over the news! The bug you can’t fix! Fortunately, you don’t need to. We explain why.