The Latest in IT Security

Posts Tagged ‘security holes’

Introduced in November 2021 alongside Binding Operational Directive (BOD) 22-01, the Known Exploited Vulnerabilities Catalog is meant to raise awareness on security flaws that are being actively exploited in cyberattacks. Three of the bugs newly added to the catalog were identified and addressed this year, two were resolved last year, and nine in 2020. The […]

Read more ...

It’s worth noting that this month Adobe did not release any updates on Patch Tuesday, as the company usually does. The latest Acrobat and Reader updates resolve a total of 68 vulnerabilities, including many critical memory corruption flaws that can be exploited for arbitrary code execution. The vulnerabilities rated “important” can lead to information disclosure, […]

Read more ...

By now we’re used to the idea of software companies running bug bounty initiatives which hand out thousands of dollars in prizes to independent researchers who find and responsibly disclose security holes. But, as Wired reports, it’s not just technology companies who are recognising the advantages of having white hat hackers test their systems. The […]

Read more ...


Categories

SUNDAY, MAY 29, 2022
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments