Automation alone isn’t enough to patch vulnerabilities — Here’s why

Automation alone isn’t enough to patch vulnerabilities — Here’s why

While the future is hard to predict, we can count on two things about the cybersecurity landscape in 2025. First: cyberattacks are growing in volume as bad actors continue to diversify their methodologies. Second: the cost of exploits is increasing.  Impacts of cyberattacks are expanding beyond financial losses, impacting the daily operations of critical services including healthcare and travel. Organizations need to consider how they approach patching as vulnerabilities increase in volume and complexity and…

Read More

Open source software vulnerabilities found in 86% of codebases

Open source software vulnerabilities found in 86% of codebases

Black Duck has released its annual Open Source Security and Risk Analysis (OSSRA) report, analyzing 1,658 examinations of 965 commercial codebases within 16 industries. According to the findings, 86% of codebases had open source software vulnerabilities while 81% had high- or critical-risk vulnerabilities. Furthermore, the average application in 2024 had triple the amount of open source files than the average application in 2020, with 5,300 in 2020 and more than 16,000 in 2024.  Below, Mike…

Read More

CISA Adds Four Vulnerabilities to Catalog for Federal Enterprise

CISA Adds Four Vulnerabilities to Catalog for Federal Enterprise

Welcome. Tell us a little bit about you. This will help us provide you with customized content. First Name Last Name Job Title Company Name Company Size Select a size 1 – 4 5 – 9 10 – 24 25 – 49 50 – 99 100 – 249 250 – 499 500 – 999 1000 – 4999 5000 – 9999 9999+ Industry Select an industry Advertising, Public Relations, and Marketing Aerospace and Aviation Agriculture and…

Read More

Why data protection is non-negotiable for every business

Why data protection is non-negotiable for every business

Every morning, I start my day by reading the news, and every morning, I see headlines about major cyberattacks and breaches causing damage to companies, brands, and people around the world. The barrage of attacks and the damage that goes with them are relentless. Attackers will always be on the lookout for soft targets, but my experience has taught me that implementing some basic yet powerful protections can shield most organizations from ransomware attacks and…

Read More

What Is Patch Tuesday? Microsoft's Monthly Update Explained

What Is Patch Tuesday? Microsoft's Monthly Update Explained

On the second Tuesday of each month, Microsoft and other tech companies release patches for consumer and enterprise users. These updates, including bug fixes and security enhancements from the previous month, are known as “Patch Tuesday.” The monthly update is an important opportunity to ensure that security features and applications are up to date. Microsoft details the official Patch Tuesday release in their Security Update Guide. Below, TechRepublic explores its purpose, how it works, and…

Read More

Apple Operating Systems are Being Targeted by Threat Actors, Report Finds

Apple Operating Systems are Being Targeted by Threat Actors, Report Finds

The number of macOS vulnerabilities exploited in 2023 increased by more than 30%, according to a new report. The Software Vulnerability Ratings Report 2024 from patch management software company Action1 also found that Microsoft Office programs are becoming more exploitable, while attackers are targeting load balancers like NGINX and Citrix at a record rate. Action1 analysts used data from the National Vulnerability Database and CVEdetails.com to draw five insights into how the threat landscape changed…

Read More

Shifting left isn’t always right

Shifting left isn’t always right

Shifting left isn’t always right | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses CookiesBy closing…

Read More

How businesses can prevent becoming the next ransomware victim

How businesses can prevent becoming the next ransomware victim

How businesses can prevent becoming the next ransomware victim | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This…

Read More

5 cyber risk and security mitigation tactics for SMBs

5 cyber risk and security mitigation tactics for SMBs

<!– 5 cyber risk and security mitigation tactics for SMBs | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. …

Read More

14 ways to win the war against ransomware

14 ways to win the war against ransomware

14 ways to win the war against ransomware | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website…

Read More