Three popular version control systems were found to contain vulnerabilities that could enable threat actors to steal source code.
The August Android Security Bulletin has been published, and it enumerates over 40 security risks that Google recently fixed in the Android OS.
Penetration testing can help organizations across all industries identify vulnerabilities before cybercriminals have a chance to exploit them.
For many companies, vulnerability management still amounts to an ongoing game of whack-a-mole to identify and remediate threats.
Researchers have created a tool that uses Git repositories to demonstrate how Agile and other software development approaches could have security issues.
Many companies have adopted the practice of recruiting a team of hackers to poke holes in their networks and assess their incident response capabilities.
The Department of Justice (DOJ) offered guidance on vulnerability disclosure programs, which will assist organizations in navigating legal issues.
A Controller Area Network (CAN) Bus standard vulnerability could impact the security of connected automobiles and other products.
Researchers discovered unpatched vulnerabilities in radiation monitoring devices (RMDs) that attackers could leverage to breach nuclear power plants.
Psychological security refers to the notion that to defend a network against threats, security professionals must be able to think like cybercriminals.