Risk Based Security
Each month we look at the vulnerability landscape by the numbers. For the data breach landscape, and for our twice-yearly QuickView Reports, which dig into the interesting trends in more detail with expert commentary, check the reports page.
Each month we look at the data breach landscape by the numbers. For the vulnerability landscape, and for our comprehensive, twice-yearly QuickView Reports, digging into the interesting trends in more detail, with expert commentary, check the reports page.
Each month we look at the vulnerability landscape by the numbers. For the data breach landscape, and for our twice-yearly QuickView Reports, which dig into the interesting trends in more detail with expert commentary, check the reports page.
Each month we look at the vulnerability landscape by the numbers. For the data breach landscape, and for our twice-yearly QuickView Reports, which dig into the interesting trends in more detail with expert commentary, check the reports page. Here are some thing you should know about the full vulnerability picture: The two Apple...
There is a new remote code execution (RCE) vulnerability developing in the background that security teams may be asked to remediate. Risk Based Security and Flashpoint have analyzed the “SpringShell” vulnerability. Compared to and rumored to be the next Log4Shell in some circles, it is another library vulnerability that could potentially affect a wide...
The Open Source Software (OSS) community has been split in two after an OSS author repurposed his own library to protest the Ukrainian-Russian war. On March 7, RIAEvangelist released several versions of his ‘node-ipc’ software package, with some versions reportedly overwriting code on machines presumably located in Russia and Belarus. His actions have...
خوراک خبری خود را بسازید
آیا آماده هستید تا آن را اجرا کنید؟
بدون نیاز به کارت اعتباری، یک دوره آزمایشی 14 روزه را شروع کنید.