Security News

STEALTHbits Technologies, a cybersecurity software company focused on protecting an organization’s sensitive data and the credentials attackers use to steal that data, announced the release of...

Mitsubishi Electric’s FR Configurator2 inverter engineering software is affected by several vulnerabilities that can be exploited for information disclosure, arbitrary code execution, privilege...

Greenbone Networks, a leading provider of vulnerability management, announced that it now detects and protects against more than 70,000 vulnerabilities through its Greenbone Security Feed. The...

Apple this week released a new set of patches to address various security flaws across its product portfolio, including 22 bugs impacting WebKit. read more

Several vulnerabilities have been discovered in Comodo Antivirus, including one that allows an attacker to escape the sandbox and escalate privileges, and the vendor does not appear to have...

GAO Makes More Security Recommendations; IRS Now Has 127 Issues to ResolveThe Internal Revenue Services' internal financial reporting systems and IT infrastructure have 14 new security...

GAO Makes More Security Recommendations; IRS Now Has 127 Issues to ResolveThe Internal Revenue Services' internal financial reporting systems and IT infrastructure have 14 new security...

Researchers at firmware security company Eclypsium discovered that the baseboard management controller (BMC) shipped with some servers from Lenovo, Gigabyte and other vendors contains some...

Vulnerability experts Michiel Prins and Greg Ose discuss the 15 most common vulnerability types.

Infiniti Research, a leading market intelligence solutions provider, has recently announced the completion of their latest risk assessment solution for an IT company. During the course of this...