Security
Headlines
HeadlinesLatestCVEs

Tag

#cisco

New Cloud Pricing and Products Proof of RSA’s Transformation

RSA pivots to exclusive focus. Identity is once again the ‘beating heart’ of RSA.

DARKReading
#cisco#git#auth
Microsoft Philanthropies Collaborates With WiCyS to Help Close the Cybersecurity Skills Gap

Microsoft Philanthropies is expanding its cybersecurity skills for jobs campaign to 23 countries and partnering with Women in CyberSecurity (WiCyS) to build a cybersecurity workforce that is not just larger but also more diverse.

Threat Source newsletter (June 2, 2022) — An RSA Conference primer

By Jon Munshaw.  Welcome to this week’s edition of the Threat Source newsletter.  Many of you readers may be gearing up for a West Coast swing over the next few weeks through San Francisco and Las Vegas for RSA and Cisco Live, respectively. And we’re right behind you!   Talos... [[ This is only the beginning! Please visit the blog for the complete entry ]]

Netenrich Debuts Resolution Intelligence Secure Digital Operations Platform at RSA 2022

New operational analytics and AI/ML platform drives contextual intelligence and prioritized actions to anticipate risky behaviors, disrupt threats and insure business resilience.

Lookout Acquires SaferPass To Address The Rising Threat Of Identity Theft

Password management solution delivers proactive, seamless approach to protecting privacy and login credentials for consumers and businesses; Password Management market expected to reach $3 billion by 2026.

Ordr Secures $40 Million in Series C Funding to Answer Increased Demand for Connected Device Security

Rising threat of data breaches and ransomware attacks drives need for complete and accurate real-time information about devices and their risks.

Threat Advisory: Zero-day vulnerability in Microsoft diagnostic tool MSDT could lead to code execution

A recently discovered zero-day vulnerability in the Microsoft Windows Support Diagnostic Tool (MSDT) made headlines over the past few days. CVE-2022-30190, also known under the name "Follina," exists when MSDT is called using the URL protocol from an application, such as Microsoft Office, Microsoft... [[ This is only the beginning! Please visit the blog for the complete entry ]]

Researcher Spotlight: Martin Lee, EMEAR lead, Talos Strategic Communications

Who knew you could connect Moses to threat intelligence?  By Jon Munshaw.  When the security community usually thinks about the origins of cybersecurity and threat intelligence, the conversation may quickly center around the codebreakers in World War II or the Creeper software developed... [[ This is only the beginning! Please visit the blog for the complete entry ]]

You Need to Update iOS, Chrome, Windows, and Zoom ASAP

Plus: Google patches 36 Android vulnerabilities, Cisco fixes three high-severity issues, and VMWare closes two “serious” flaws.