Application Security

Article

White House Hosts Open-Source Security Summit With Big Tech

Dan Gunderman  •  January 13, 2022

Article

Microsoft Patch Tuesday: An 'Unusually Large' Patch Release

Prajeet Nair  •  January 12, 2022

Article

Buffer Overflow Vulnerability Disrupts 3D Printers

Prajeet Nair  •  January 12, 2022

Article

Night Sky Ransomware Distributed via Log4j Exploits

Mathew J. Schwartz  •  January 12, 2022

Article

CISA: Federal Response to Log4j Has Been 'Exceptional'

Dan Gunderman  •  January 10, 2022

Article

Hackers Exploiting Flaws in Google Docs' Comments Feature

Prajeet Nair  •  January 8, 2022

Article

Log4j: Sen. Peters Revisits Incident Reporting Legislation

Dan Gunderman  •  January 7, 2022

Article

CISO Playbook: Log4j Response - What We Did, What We Learned

Tom Field  •  January 6, 2022

Article

ZLoader Malware Exploits Microsoft Signature Verification

Prajeet Nair  •  January 5, 2022

Article

Microsoft: Log4j Exploit Attempts, Testing Remain Rampant

Dan Gunderman  •  January 4, 2022

Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.in, you agree to our use of cookies.