September 12, 2017 Disclosure of 10 D-Link Zero-Day Flaws Raises Huge Router Security Concerns 2 min read - Router security fears have prompted a researcher to recommend that members of the general should disconnect their D-Link 850L routers from the internet.
September 6, 2017 Little-Known PDF Flaw Creates Crashing Concerns 2 min read - A little-known PDF flaw in a parsing library that was originally discovered six years ago is also present in many contemporary and popular file viewers.
August 24, 2017 Cybercriminals Could Easily Take Over Industrial Cobots, Researchers Warn 2 min read - Security researchers discovered more than 50 vulnerabilities in industrial cobots that could allow cybercriminals to change safety settings from afar.
Application Security August 21, 2017 Three Practical Tips That Empower Developers and Prevent Open Source Security Risks From Entering Your Code 4 min read - There are many benefits to developing software using open source code, but these components can also introduce vulnerabilities into your code.
August 15, 2017 PostgreSQL Database Management System Patches Password Flaws 2 min read - PostgreSQL developers announced a round of patches to address more than 50 bugs and three vulnerabilities in the popular database management system.
August 14, 2017 Git Vulnerabilities Found in Version Control Systems 2 min read - Three popular version control systems were found to contain vulnerabilities that could enable threat actors to steal source code.
August 10, 2017 August Android Security Bulletin Patches Critical Vulnerabilities 2 min read - The August Android Security Bulletin has been published, and it enumerates over 40 security risks that Google recently fixed in the Android OS.
Risk Management August 10, 2017 Eight Myths Not to Believe About Penetration Testing 3 min read - Penetration testing can help organizations across all industries identify vulnerabilities before cybercriminals have a chance to exploit them.
Risk Management August 9, 2017 Assessing Risks and Remediating Threats With a Layered Approach to Vulnerability Management 4 min read - For many companies, vulnerability management still amounts to an ongoing game of whack-a-mole to identify and remediate threats.
August 7, 2017 GitPwnd Shows How Threat Actors Could Hijack Git Repositories in Software Development 2 min read - Researchers have created a tool that uses Git repositories to demonstrate how Agile and other software development approaches could have security issues.