IBM X-Force reported a downward trend in publicly available exploit code, but security teams must still prioritize vulnerability and patch management.
Router security fears have prompted a researcher to recommend that members of the general should disconnect their D-Link 850L routers from the internet.
A little-known PDF flaw in a parsing library that was originally discovered six years ago is also present in many contemporary and popular file viewers.
Security researchers discovered more than 50 vulnerabilities in industrial cobots that could allow cybercriminals to change safety settings from afar.
Three Practical Tips That Empower Developers and Prevent Open Source Security Risks From Entering Your Code
There are many benefits to developing software using open source code, but these components can also introduce vulnerabilities into your code.
PostgreSQL developers announced a round of patches to address more than 50 bugs and three vulnerabilities in the popular database management system.
Three popular version control systems were found to contain vulnerabilities that could enable threat actors to steal source code.
The August Android Security Bulletin has been published, and it enumerates over 40 security risks that Google recently fixed in the Android OS.
Penetration testing can help organizations across all industries identify vulnerabilities before cybercriminals have a chance to exploit them.
For many companies, vulnerability management still amounts to an ongoing game of whack-a-mole to identify and remediate threats.