hardware
65 vendors affected by severe vulnerabilities in Realtek chips
A vulnerability within the Realtek RTL819xD module allows attackers to gain complete access to the device, installed operating systems and other network devices. The chips …
The importance of compute lifecycle assurance in a zero-trust world
With the proliferation of attack surfaces in IoT, the increase in firmware-based attacks on hardware, and growing threats to systems throughout their lifecycle, companies are …
How can secure KVM technology help eliminate security risks?
John Minasyan leads Belkin’s cybersecurity business unit focused on solutions to mitigate advanced threats at an operator’s desk. In this conversation with Help Net Security, …
Worldwide HDD and SSD market growth shows strong demand for data storage
IDC recently published new forecasts for the worldwide hard disk drive (HDD) and solid state drive (SSD) market. While both markets were affected by the COVID-19 pandemic, the …
Are your cryptographic keys truly safe? Root of Trust redefined for the cloud era
In the digital world, cryptographic solutions use encryption keys to secure data at rest, data in use, and data in transit. They are responsible for encrypting and decrypting …
Higher encryption adoption driven by rising data breach threats
Security and IT professionals in the Middle East are demonstrating a rising desire to secure critical applications and data, driving higher encryption adoption for newer use …
Organizations have seen an increase in device encryption
32% of organizations have seen an increase in device encryption in the past year, according to a Vanson Bourne survey. Additionally, 31 percent noted that their organization …
Security doesn’t always require immediacy
New security threats emerge almost continuously, meaning we now deal with a known unknown. In the past year alone, malware and ransomware use has sharply increased, 43% of …
Research directions in cybersecurity to support a digital strategic autonomy
Resilience, technological sovereignty and leadership are essential for the EU and as such, they are addressed by the EU Cybersecurity Strategy. In an effort to support this …
Critical infrastructure implications of the Pulse Secure multi-factor authentication bypass
The FireEye Mandiant team has discovered multiple threat actors exploiting a zero-day vulnerability in Pulse Secure VPN appliances. The attack infrastructure is very …
Using memory encryption in web applications to help reduce the risk of Spectre attacks
There’s nothing quite like an actual proof-of-concept to make everyone listen. I was pleased by the PoC released by Google security engineers Stephen Röttger and Artur Janc …
Why enterprises need rugged devices with integrated endpoint management systems
The debate within business organizations of whether to use consumer devices or to invest in rugged devices for the operations side of their business is as old as personal …
Featured news
Resources
Don't miss
- Cisco fixes ClamAV vulnerability with available PoC and critical Meeting Management flaw
- SonicWall SMA appliances exploited in zero-day attacks (CVE-2025-23006)
- Defense strategies to counter escalating hybrid attacks
- Web Cache Vulnerability Scanner: Open-source tool for detecting web cache poisoning
- Funding soars in a milestone year for Israeli cybersecurity