[R1] Nessus Versions 8.15.4 and 10.1.2 Fix One Third-Party Vulnerability
Nessus leverages third-party software to help provide underlying functionality. One of the third-party components (OpenSSL) was found to contain vulnerabilities, and an updated version has...
USN-5355-1: zlib vulnerability
Danilo Ramos discovered that zlib incorrectly handled memory when performing certain deflating operations. An attacker could use this issue to cause zlib to crash, resulting...
Infosecurity Europe Unveils Keynote Speakers for 2022 Event
Day 1 will include a talk from Major General Tom Copinger-Symes CBE, director of strategy and military digitisation with UK Strategic Command Read More
Palo Alto launches cloud-native firewall service for AWS
Palo Alto Networks has launched a new, fully managed “next-generation” firewall (NGFW) service in partnership with Amazon Web Services designed to remove the complexities of...
Stalking with an Apple Watch
The malicious uses of these technologies are scary: Police reportedly arrived on the scene last week and found the man crouched beside the woman’s passenger...
A Third of UK Businesses Experience Cyber-Attacks at Least Once a Week
Around two in five businesses experienced breaches or cyber-attacks in the past 12 months Read More
Introducing Personal Data Cleanup
We’re excited to announce the release of McAfee’s Personal Data Cleanup, a new feature that finds and removes your personal info from data brokers and...
AT&T Cybersecurity earns four Cybersecurity Excellence Awards
Will Eborall, Asst VP, AT&T Cybersecurity and Edge Solutions Product Management, co-authored this blog. The AT&T Cybersecurity team’s unwavering focus on managing risk while maximizing...
NCSC: Time to Rethink Russian Supply Chain Risks
Kremlin coercion and sanctions could impact Western customers Read More
4 ways attackers target humans to gain network access
Every day, I see the failure in our technology. I’m sure you see it as well. Since the day we started receiving email, we have...