Threat and Vulnerability Intelligence Database

RSS Feed

Example Searches:

Description: Amazon Web Services' identity and access management platform has added new features that help developers implement secure, scalable, and customizable authentication solutions for their applications.
Source: Dark Reading
November 27th, 2024 (5 months ago)
Description: The APT, aka Earth Estries, is one of China's most effective threat actors, performing espionage for sometimes years on end against telcos, ISPs, and governments before being detected.
Source: Dark Reading
November 27th, 2024 (5 months ago)
Description: New York state regulators punish insurers after cybercriminals illegally access customer info they then used to file scam unemployment claims during the COVID-19 pandemic.
Source: Dark Reading
November 27th, 2024 (5 months ago)
Description: The innocuously named Russian-sponsored cyber threat actor has combined critical and serious vulnerabilities in Windows and Firefox products in a zero-click code execution exploit.
Source: Dark Reading
November 27th, 2024 (5 months ago)
Description: Neurodivergent talent can add so much to a cybersecurity team. How can companies ensure they have the right hiring and onboarding practices in place to help these employees succeed?
Source: Dark Reading
November 27th, 2024 (5 months ago)
Description: With a focus on creating technologies for other markets, Israel continues to be a valued destination for venture capital in cybersecurity outside the US and Europe.
Source: Dark Reading
November 27th, 2024 (5 months ago)
Description: The preview version now includes multiple security-focused additions Microsoft had promised to add, such as SecureBoot, BitLocker, and Windows Hello.
Source: Dark Reading
November 27th, 2024 (5 months ago)
Description: GenAI's 30%-50% coding productivity boost comes with a downside — it's also generating vulnerabilities. Veracode's Chris Wysopal talks about what he finds out in this News Desk interview during Black Hat USA.
Source: Dark Reading
November 27th, 2024 (5 months ago)
Description: Enterprise cybersecurity teams tell Omdia's Maxine Holt that they want to dig out from underneath mounting tech and pivot to a simpler platform model — but they are finding that tricky to pull off.
Source: Dark Reading
November 27th, 2024 (5 months ago)
Description: Over the past year, "Matrix" has used publicly available malware tools and exploit scripts to target weakly secured IoT devices — and enterprise servers.
Source: Dark Reading
November 27th, 2024 (5 months ago)