Tanium plans to bring the power of autonomous endpoint management with real-time visibility to web browsers providing a stronger front against cyber-attacks.
On April 16, 2025, a critical moment unfolded in the cybersecurity world when the U.S. Department of Homeland Security’s funding for the Common Vulnerabilities and Exposures (CVE) Program, operated by MITRE, was set to expire. The CVE system is a globally relied-upon database for cataloging known cyber vulnerabilities and has been a cornerstone of vulnerability management for over 25 years since its public launch in 1999.
On April 24th, 2025, SAP disclosed CVE-2025-31324, a critical missing authorization check vulnerability (CVSS 10.0) affecting the Metadata Uploader component of SAP NetWeaver Visual Composer. This vulnerability fails to restrict file upload content, allowing unauthenticated remote attackers to achieve full remote code execution (RCE) on affected servers.
Update to attack framework announced to coincide with recognition as an industry standard The Open Worldwide Application Security Project (OWASP) announced today that the Business Logic Attack Definition Framework (BLADE Framework) has become The OWASP BLADE Framework Project. The name change reflects the acceptance of the attack framework as an OWASP project and recognition of the framework as an industry standard.
The second annual Remediation Operations Report from Seemplicity paints a clear picture: while organizations are investing more in security, they’re not necessarily getting faster or more effective at fixing what matters. This year’s data highlights a growing gap between strategic intent and day-to-day execution. Security leaders want to move faster, collaborate better, and prioritize smarter. But process bottlenecks and legacy workflows keep getting in the way.
A massive power outage struck significant portions of Portugal and Spain at 10:34 UTC on April 28, grinding transportation to a halt, shutting retail businesses, and otherwise disrupting everyday activities and services. Parts of France were also reportedly impacted by the power outage.
Security operations and large-scale conferences have more in common than you'd think: too much noise, too many tools, and insufficient clarity. Both can leave you overwhelmed with information as you sort through one acronym or bold claim after another, only to end up with more questions than answers. RSA Conference is no exception. Booths are packed with AI promises and buzzwords, but there’s little visibility into how anything works.
Vanta is proud to be one of the first companies to achieve ISO 42001 compliance with our audit partner Schellman, an ANSI-accredited ISO 42001 auditor. To prepare for and pass our audit, our team worked diligently to assess our specific business needs, communicate clearly with stakeholders and AI leadership, and complete formal training to learn how to develop, integrate, and deploy trustworthy AI systems in line with emerging laws and policies.
CrowdStrike is launching new innovations to power the AI-native security operations center (SOC) and help teams hunt and resolve threats with speed and accuracy. A new solution, CrowdStrike Falcon Adversary OverWatch Next-Gen SIEM, will bring managed threat hunting to available third-party data and extend the visibility of CrowdStrike’s elite threat hunters into unmanaged attack surfaces.
The pace and prevalence of adversarial AI is only accelerating — and organizations must harness the power of AI to stop them. CrowdStrike is building the tools they need to do it. Our latest innovations include Charlotte AI Agentic Workflows, Charlotte AI Agentic Response, and CrowdStrike Falcon Complete Next-Gen MDR now using CrowdStrike Charlotte AI. We are also announcing platform-level AI advancements that prioritize risk and aid in response.