The 2023 State of Cybersecurity for Medical Devices and Healthcare Systems report, a collaboration of the Health Information Sharing and Analysis Center with Securin and Finite State, examined the ...
As the agency’s vulnerability database buckles under a flood of submissions, it’s planning to shift some responsibilities to other parties.
Automated firmware-analysis tools and the falling cost of the technical hardware needed to inspect computer processors and memory are leading to a surge in reports of firmware vulnerabilities and ...
In context: Researchers at cybersecurity firm Eclypsium have detailed two new critical vulnerabilities in the MegaRAC Baseboard Management Controller (BMC) software made by American Megatrends ...
SAN JOSE, Calif.--(BUSINESS WIRE)--Forescout Technologies, Inc., a global cybersecurity leader, and Finite State, an industry leader in software supply chain security, announced today the release of a ...
A “scary” vulnerability in Broadcom Wi-Fi chipsets could lead to long-term instability and affect how an organization operates.
HOUSTON, May 15, 2025 /PRNewswire/ -- Action1, a leading provider of autonomous endpoint management (AEM) solutions, today released its 2025 Software Vulnerability Ratings Report, revealing a 61% year ...
DALLAS, April 2, 2024 /PRNewswire/ -- Global cybersecurity leader Trend Micro Incorporated (TYO: 4704; TSE: 4704) has announced the outcomes from its Pwn2Own ethical hacking contest, hosted by the ...
Microsoft announced on Wednesday that firmware security advisories are now available within the Microsoft Defender Vulnerability Management service. Currently, though, Microsoft's service just has ...
It's hard to believe that despite so much manpower, time, and money dedicated to the cybersecurity industry, an entire class of vulnerability can fly under the radar. But researchers from Forescout ...
If your organization uses servers that are equipped with baseboard management controllers from Supermicro, it may be time, once again, to patch seven high-severity vulnerabilities that attackers could ...