Eclipse Foundation Mandates Pre-Publish Security Checks for Open VSX Extensions on February 3, 2026 Posted by The Hacker News
CISA Adds Actively Exploited SolarWinds Web Help Desk RCE to KEV Catalog on February 3, 2026 Posted by The Hacker News
ISC Stormcast For Wednesday, February 4th, 2026 https://isc.sans.edu/podcastdetail/9794, (Wed, Feb 4th) on February 3, 2026 Posted by SANS Internet Storm Center, InfoCON: green
Docker Fixes Critical Ask Gordon AI Flaw Allowing Code Execution via Image Metadata on February 3, 2026 Posted by The Hacker News
Posted in business security Black Hat Europe 2025: Was that device designed to be on the internet at all? on December 12, 2025 WeLiveSecurity
Posted in business security Black Hat Europe 2025: Reputation matters – even in the ransomware economy on December 11, 2025 WeLiveSecurity
Posted in business security Locks, SOCs and a cat in a box: What Schrödinger can teach us about cybersecurity on December 11, 2025 WeLiveSecurity
Posted in business security Seeking symmetry during ATT&CK® season: How to harness today’s diverse analyst and tester landscape to paint a security masterpiece on December 10, 2025 WeLiveSecurity
Posted in business security The big catch: How whaling attacks target top executives on December 9, 2025 WeLiveSecurity
Posted in business security Phishing, privileges and passwords: Why identity is critical to improving cybersecurity posture on December 4, 2025 WeLiveSecurity
Posted in business security MDR is the answer – now, what’s the question? on November 24, 2025 WeLiveSecurity
Posted in business security Why shadow AI could be your biggest security blind spot on November 11, 2025 WeLiveSecurity
Posted in business security Ground zero: 5 things to do after discovering a cyberattack on November 3, 2025 WeLiveSecurity
Posted in business security Recruitment red flags: Can you spot a spy posing as a job seeker? on October 28, 2025 WeLiveSecurity