#security vulnerabilities

[ follow ]
#security-vulnerabilities

ONCD releases report on the adoption of memory-safe languages

Memory safe programming languages can reduce common vulnerabilities.
National Cyber Director calls for software and hardware creators to prioritize addressing memory safety issues.

How New Relic's Kubernetes Agents team decreased release time by 99% with GitHub workflows

New Relic automated their software agent release process for the Kubernetes integration, reducing deployment time from two weeks to one hour per week.
New Relic improved their response to security vulnerabilities by enabling code-scanning tools in their continuous integration pipeline, automatically patching code without human interaction within a week of a fix being available.

US cyber officials issue urgent warning to millions of Apple users

Cyber officials urge Apple device updates for enhanced security.

Basic failures led to hack of Electoral Commission data on 40 million people | Computer Weekly

ICO reprimands Electoral Commission for basic security errors allowing Chinese hackers to access 40 million people's data.

Mitigating cyber risks in mergers and acquisitions

Acquisitions can pose significant security threats, as seen in cases like Dropbox, Marriott, and Yahoo, leading to data breaches, regulatory fines, and legal scrutiny.

Researchers Uncover OS Downgrade Vulnerability Targeting Microsoft Windows Kernel

A new technique can bypass Microsoft's Driver Signature Enforcement on patched Windows systems, allowing OS downgrade attacks with severe security implications.

ONCD releases report on the adoption of memory-safe languages

Memory safe programming languages can reduce common vulnerabilities.
National Cyber Director calls for software and hardware creators to prioritize addressing memory safety issues.

How New Relic's Kubernetes Agents team decreased release time by 99% with GitHub workflows

New Relic automated their software agent release process for the Kubernetes integration, reducing deployment time from two weeks to one hour per week.
New Relic improved their response to security vulnerabilities by enabling code-scanning tools in their continuous integration pipeline, automatically patching code without human interaction within a week of a fix being available.

US cyber officials issue urgent warning to millions of Apple users

Cyber officials urge Apple device updates for enhanced security.

Basic failures led to hack of Electoral Commission data on 40 million people | Computer Weekly

ICO reprimands Electoral Commission for basic security errors allowing Chinese hackers to access 40 million people's data.

Mitigating cyber risks in mergers and acquisitions

Acquisitions can pose significant security threats, as seen in cases like Dropbox, Marriott, and Yahoo, leading to data breaches, regulatory fines, and legal scrutiny.

Researchers Uncover OS Downgrade Vulnerability Targeting Microsoft Windows Kernel

A new technique can bypass Microsoft's Driver Signature Enforcement on patched Windows systems, allowing OS downgrade attacks with severe security implications.
moresecurity-vulnerabilities

Apple Security Update Fixes Zero-Day Webkit Exploits

Apple has patched two zero-day vulnerabilities affecting iOS, iPadOS, and macOS.
The vulnerabilities were discovered by Google's Threat Analysis Group.
#Apple

Apple Security Update Fixes Zero-Day Webkit Exploits

Apple has patched two zero-day vulnerabilities affecting iOS, iPadOS, and macOS.
The vulnerabilities were discovered by Google's Threat Analysis Group.

Apple Security Update Fixes Zero-Day Webkit Exploits

Apple has patched two zero-day vulnerabilities affecting iOS, iPadOS, and macOS.
The vulnerabilities were discovered by Google's Threat Analysis Group.

Apple Security Update Fixes Zero-Day Webkit Exploits

Apple has patched two zero-day vulnerabilities affecting iOS, iPadOS, and macOS.
The vulnerabilities were discovered by Google's Threat Analysis Group.

Apple Security Update Fixes Zero-Day Webkit Exploits

Apple has patched two zero-day vulnerabilities affecting iOS, iPadOS, and macOS.
The vulnerabilities were discovered by Google's Threat Analysis Group.
moreApple
[ Load more ]