Both process flow diagrams and data flow diagrams can be valuable tools for threat modeling, but they...
News
In the last decade we’ve seen a surge in malware activity from targeted attacks like stuxnet to...
Phishing, the theft of users’ credentials or sensitive data using social engineering, has been a significant threat...
Security vulnerabilities in remote desktop programs such as Sunlogin and AweSun are being exploited by threat actors...
VMware ESXi hypervisors are the target of a new wave of attacks designed to deploy ransomware on...
Microsoft has released updates to address multiple vulnerabilities in Microsoft software. An attacker can exploit some of...
OpenSSL has released a security advisory to address multiple vulnerabilities affecting OpenSSL versions 3.0.0, 2.2.2, and 1.0.2....
Apple has released security updates to address vulnerabilities in multiple products. An attacker could exploit these vulnerabilities...
A zero-day vulnerability affecting Fortra’s GoAnywhere MFT managed file transfer application is being actively exploited in the...
Atlassian has released fixes to resolve a critical security flaw in Jira Service Management Server and Data...