CISA Adds Two Known Exploited Vulnerabilities to Catalog
CISA has added two new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. CVE-2023-42917 Apple Multiple Products WebKit Memory Corruption Vulnerability CVE-2023-42916 Apple Multiple Products...
The NCSC, which is a part of GCHQ, is recommending organisations follow the guidance published by US agencies and the INCD, regarding the active exploitation of Unitronics programmable logic controllers (PLCs) used in a range of industries including...
Interpol Arrests Smuggler With New Biometric Screening Database
Interpol has upgraded its biometric background check tech. It'll help catch criminals, but will it protect sensitive, immutable data belonging to the innocent?
Cisco Live 2023 Melbourne: Cisco U. Theatre Sessions
Your gateway to a world of knowledge and opportunities, the Cisco U. Theatre returns to the Learning & Certifications Booth in The HUB at Cisco Live in Melbourne, December 5-8, 2023.
Enterprise security goes beyond tech leadership, and beyond the CISO's office. Achieving cybersecurity and resilience is a team effort, and requires building a culture of security awareness.
Critical 'LogoFAIL' Bugs Offer Secure Boot Bypass for Millions of PCs
Hundreds of consumer and enterprise-grade x86 and ARM devices from various vendors, including Intel, Acer, and Lenovo, are potentially vulnerable to bootkits and takeover.