Once an incident has occurred and you've responded, then what? Join us for a chat with Sean Metcalf on what we can do to ensure our infrastructure remains resilient after a security incident.
Qualcomm on Tuesday disclosed nearly two dozen security vulnerabilities in its chipsets, including the company’s flagship suite of SnapDragon processor chips and affecting products that range from cars to powerline communications.
Open source software utilization has been scaled back by nearly 40% of industry professionals due to security concerns, with more than 50% reducing open source usage following the emergence of the widespread Log4j vulnerability, The Register reports.
New security vulnerabilities have been added by Keksec threat group, also known as Kek Security, FreakOut, and Necro, to its Enemybot Linux-based botnet to attack web servers, content management systems, and Android devices, reports The Hacker News.
ZDNet reports that Windows domain administrators have been given guidance by Microsoft on better defending their systems against Kerberos Relay attacks, which enable malicious actors to obtain System privileges.
Just over one-third of organizations that face security challenges with various systems say they are actually addressing it in a “formal, enterprise-wide manner," according to a PricewaterhouseCooper survey.