February’s report on Microsoft patches includes 56 vulnerabilities, two of which are zero-day flaws that have been exploited.
February’s report on Microsoft patches includes 56 vulnerabilities, two of which are zero-day flaws that have been exploited.
Trend Micro guards desktop and mobile devices from ransomware, phishing schemes, spam, and more for one year.
Gemini 2.0 Flash is available now, with other model sizes coming in January. It adds multilingual voice output, image output, and some trendy “agentic” capabilities.
December marked a quiet month with 70 vulnerabilities patched, plus updates from outside of Microsoft.
Threat actors exploited two vulnerabilities in Intel-based machines. Google’s Threat Analysis Group discovered the flaws.
It only takes five days on average for attackers to exploit a vulnerability, according to a new report.
Microsoft’s Siva Sundaramoorthy provides a blueprint for how common cyber precautions apply to generative AI deployed in and around security systems.
Investigation of the use-after-free flaw is ongoing, but organizations and individual users can update Firefox now for a fix.
Check Point documented 5,000 emails coming from legitimate-looking organizational domains.
Users of Google Cloud’s virtual machines can now get in-house attestation for VMs that offer AMD encrypted virtualization.