The latest addition to the U.S. Cybersecurity and Infrastructure Security Agency’s (CISA) Known Exploited Vulnerabilities (KEV) Catalog is as subtle as a bullhorn in a silent library: three fresh, high-impact vulnerabilities with consequences that ripple far beyond government cubicles. If you...
If you think a cyberattack can’t happen to you, think again: 600 million identity attacks occur every single day. That’s a number so high, even your most overactive paranoid relative can’t keep up. Cybersecurity isn’t just another checkbox for the C-suite—it’s the great existential risk of...
The Critical Security Vulnerability in Delta Electronics COMMGR: What IT Professionals Need to Know
The world of industrial control systems (ICS) and critical infrastructure is facing yet another significant cybersecurity challenge involving one of the key players: Delta Electronics. Known for...
National Instruments LabVIEW: Navigating the Vulnerabilities and Safeguarding Your Systems
In the ever-evolving landscape of industrial control systems (ICS) and engineering software tools, security remains paramount. National Instruments LabVIEW, a popular platform used globally for system...
Microsoft’s Request for a Video POC: A Rigid Process Under Scrutiny
A recent incident has spotlighted a curious practice at the Microsoft Security Response Center (MSRC) that may be prompting questions about the balance between thoroughness and red tape in vulnerability disclosure. Senior...
In today’s digital battleground, where every line of code could be a potential gateway for cyber adversaries, the role of the Microsoft Security Response Center (MSRC) in coordinating vulnerability research and disclosure has never been more critical. By forging robust partnerships with internal...
The Cybersecurity and Infrastructure Security Agency (CISA) recently unveiled its Vulnerability Disclosure Policy (VDP) Platform 2023 Annual Report, showcasing its significant achievements during its second full year of operation. With cybersecurity threats continuously evolving, the report...
Two years ago, in front of a standing-room only crowd here at Black Hat, we introduced three new information sharing programs as well as the concept of Community-Based Defense. The underlying concept shared by all three programs was simple-collaboration will be key to preventing and defending...
adobe
black hat
collaboration
community defense
coordinated vulnerability
customer needs
cybersecurity
digital crime
emet
exploitability
feedback
information sharing
mitigation toolkit
protection providers
research community
security ecosystem
security landscape
trustworthy computing
vulnerabilities
vulnerabilitydisclosure