Security
Headlines
HeadlinesLatestCVEs

Source

DARKReading

Researchers Detail 4 SAP Bugs, Including Flaw in ABAP Kernel

Patches are available for three bugs, but with technical details and PoCs now available, threat actors can craft targeted attacks.

DARKReading
#vulnerability#rce#perl#buffer_overflow#auth#sap
Center for Internet Security, CREST Join Forces to Secure Organizations Globally

New program provides organizations a way to show customers and partners their cybersecurity posture meets rigorous standards of CREST accreditation.

TXOne Networks' Stellar Solution Safeguards Operational Stability for Organizations in Various Industries

Stellar leverages cyber physical system detection and response (CPSDR) to prevent unexpected system changes from impacting operational reliability and availability.

WatchGuard Threat Lab Report Reveals New Browser-Based Social Engineering Trends

Key findings from the research also show three of the four new malware threats on this quarter's top-ten list originated in China and Russia, living-off-the-land attacks on the rise, and more.

Employer Demand for Technology Workers Across Europe Remains on Firm Footing

More than 950,000 job postings for tech positions in Q4 2022.

Cybellum Unveils New Brand, Amplifying Commitment to Team-Centric Product Security

The new brand is launched alongside new product security platform capabilities such as a vulnerability management (VM) co-pilot and incident response investigation management, providing automation and workflows for the many teams involved in product security.

Invary Raises $1.85M in Pre-Seed Funding to Close Critical Gap in Zero Trust Security

The company introduces a solution to restore trust in customers' existing cyber defense techstack.

Mend.io Launches Inaugural Open Source Reliability Leaderboard

New report offers valuable resource to help organizations evaluate the safety and reliability of open-source packages.

AI-Enabled Voice Cloning Anchors Deepfaked Kidnapping

Virtual kidnapping is just one of many new artificial intelligence attack types that threat actors have begun deploying, as voice cloning emerges as a potent new imposter tool.