The Latest in IT Security

Posts Tagged ‘software vulnerabilities’

Hi, again everyone!  Today we released the 11th volume of the Microsoft Security Intelligence Report, also known as SIRv11.   I have to say once again we’ve outdone ourselves and launched the largest and most comprehensive version of this report to date. This time it’s over 800 pages of threat intelligence spanning 100+ countries and regions […]

Read more ...

Bug bounty programs are designed to reward security researchers for finding flaws in a vendor’s product that have made it past their own quality processes. Some organizations, such as Google and Mozilla, have had bug bounty programs in place for a time, while social networking site Facebook just announced a bug bounty program with a […]

Read more ...

Lulz team seems to have their signature on the Security page almost on a weekly basis.Just today, “The Sun” newspaper’s online home-page has been defaced, playing on the recent Murdoch issue but the most recent and interesting case certainly remains the attack to Italian Universities.On its Twitter page LulzStorm posted a supposed dump of the […]

Read more ...


Categories

SUNDAY, APRIL 20, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments