Android mobile apps reusing advertising SDKs still using HTTP protocol risk exposing unencrypted user personal information, security researchers warned at the RSA Conference.
Security researchers reported several vulnerabilities in ICS routers commonly used in vital infrastructures, such as water and electricity generation and distribution.
Analysis of over 1,000 open-source serverless applications revealed that 21% of them have critical vulnerabilities or were misconfigured. What does this mean for DevOps?
We look at some of the defining moments in the threat landscape that helped steer organizations toward adding proactive incident response strategies to their cybersecurity defenses.
Security researchers discovered critical zero-day vulnerabilities in some products created by ManageEngine, a software company that creates software designed to manage IT assets.
A medida que los entornos ganan en interconexión, las amenazas se vuelven cada vez más sofisticadas. Así lo confirman los acontecimientos más destacados del año pasado en materia de seguridad.
A new research demonstrated a proof-of-concept attack they named “Mosquito,” which can exfiltrate data from online and air-gapped computers using speakers and headphones.