Four cybersecurity startups kicked off the month of May with pre-seed, seed, and early-stage funding rounds to tackle cybersecurity problems…
Author: sysops
Like antivirus software, vulnerability scans rely on a database of known weaknesses. That’s why websites like VirusTotal exist, to give…
Hackers target Cisco Firewalls due to their widespread use and the potential to exploit vulnerabilities to gain unauthorized access, steal…
The Cybersecurity and Infrastructure Security Agency (CISA) has issued a critical alert concerning a newly identified vulnerability in GitLab, a…
Hackers aim at well-known Android applications because many people use them, which means that when they attack, it can impact…
Critical vulnerabilities in MailCleaner versions before 2023.03.14 allow remote attackers to take complete control of the appliance through malicious emails,…
Traceable AI, a San Francisco startup building technology to help businesses secure cloud API connections, has raised $30 million in…
When the Cybersecurity and Infrastructure Security Agency (CISA) first published its Secure by Design software protection initiative on April 13,…
Truffle Security Co. has recently discovered a major vulnerability in Postman, the widely used API testing platform. This flaw exposed…
Security researchers at JFrog have identified three large-scale campaigns targeting Docker Hub with repositories that did not contain container images…