Reports to the National Vulnerability Database jumped in 2022, but we should pay just as much attention to the flaws that are not being reported to NVD, including those affecting the software supply chain.
- September 30, 2022
- by CDA News Team
- Cyber News
- Less than a minute
- 331 Views
Related Post
When Good Extensions Go Bad: Takeaways from the
News has been making headlines over the weekend of the extensive attack campaign targeting browser extensions and injecting them with
Happy 15th Anniversary, KrebsOnSecurity!
Image: Shutterstock, Dreamansions. KrebsOnSecurity.com turns 15 years old today! Maybe it’s indelicate to celebrate the birthday of a cybercrime blog
New HIPAA Rules Mandate 72-Hour Data Restoration and
The United States Department of Health and Human Services’ (HHS) Office for Civil Rights (OCR) has proposed new cybersecurity requirements
THN Weekly Recap: Top Cybersecurity Threats, Tools
Every week, the digital world faces new challenges and changes. Hackers are always finding new ways to breach systems, while
When Good Extensions Go Bad: Takeaways from the
News has been making headlines over the weekend of the extensive attack campaign targeting browser extensions and injecting them with
Happy 15th Anniversary, KrebsOnSecurity!
Image: Shutterstock, Dreamansions. KrebsOnSecurity.com turns 15 years old today! Maybe it’s indelicate to celebrate the birthday of a cybercrime blog
New HIPAA Rules Mandate 72-Hour Data Restoration and
The United States Department of Health and Human Services’ (HHS) Office for Civil Rights (OCR) has proposed new cybersecurity requirements
THN Weekly Recap: Top Cybersecurity Threats, Tools
Every week, the digital world faces new challenges and changes. Hackers are always finding new ways to breach systems, while