Researchers published two pieces of exploit code that can allow anyone to interact with an organization's SAP enterprise resource planning platform and perform unauthorized transactions.
Your CSIRT protects your organizational network, but who secures your products? It may be time you started a PSIRT at your company.
Security researcher Ed Foudil proposed adding a security.txt to every website to standardize the process of reporting vulnerabilities.
In response to two attacks, new Internet Explorer exploit mitigations were released to increase the cost of exploiting IE use-after-free vulnerabilities.