Security News
You've likely never heard of an open-source library called XZ Utils, but it's on hundreds of millions of computers. Many open-source libraries, like XZ Utils, are maintained by volunteers.
Exclusive Taxi software biz iCabbi recently fixed an issue that exposed the personal information of nearly 300,000 individuals via an unprotected database. According to research shared with The Register ahead of publication, the details of individuals with senior roles in media outlets such as the BBC and various government departments such as His Majesty's Treasury, the UK Home Office, and the Ministry of Justice were included.
Apple on Wednesday revised its documentation pertaining to its mercenary spyware threat notification system to mention that it alerts users when they may have been individually targeted by such...
Bruce Schneier was at the first ever RSA Conference in 1991, and he was the first 'exhibitor' in 1994 when he asked Jim Bidzos, Creator of the RSA Conference, if he could sell copies of his book "Applied Cryptography." Bidzos set Schneier up in the hotel lobby where the conference was being held-and the rest is history. Listen to some great RSA Conference memories on this episode of the History of RSA Conference.
Fortinet has released patches to address a critical security flaw impacting FortiClientLinux that could be exploited to achieve arbitrary code execution. Tracked as CVE-2023-45590, the...
Announced last year, Google's proposal to reduce the lifespan of TLS certificates from 13 months to 90 days could be implemented in the near future. As a result, the new 90-day TLS certificate lifespan proposed by Google will have far-reaching impacts on three areas of corporate IT: DevOps, security and operations.
In short, using generative AI over the top of your existing enterprise content demands strict attention to information sensitivity labelling, information classification and governance. In summary, it is vital to tightly control information governance before letting AI search and generative services loose on your information.
Please turn on your JavaScript for this page to function normally. Graylog is an open-source solution with centralized log management capabilities.
The findings highlight the lack of data management oversight across industries, especially for financial services organizations that often handle exorbitant amounts of personally identifiable information. This "Stale data" poses serious consumer data security issues for individuals and businesses, opening the door to identity theft and data security breaches-especially during tax season when so much personal data is being shared across digital platforms.
Many security vulnerabilities result from human error, and the majority of these are reflected in the application layer. These errors may occur at any stage in the software development life cycle, from code to cloud.