News

Congress and the Trump Administration Must Fix a Ruling prohibiting private companies from retroactively authorizing access ...
Microsoft Threat Intelligence has discovered a macOS vulnerability, tracked as CVE-2025-31199, that could allow attackers to ...
Unpatched Apple devices remain exposed to Sploitlight, a macOS flaw that allows unauthorized access to private user data ...
Coordinated vulnerability disclosure (CVD) is a process intended to ensure that these steps occur in a way that minimizes the harm posed by vulnerable products. The Guide provides an introduction ...
The vulnerability, ZDI-CAN-25373, is being actively exploited by cybercriminals this year. Windows File Explorer flaw allows malicious LNK files to target users across different VLANs.
Coordinated vulnerability disclosure programs, often called “bug bounty” programs, will become much more widely adopted over the next few years. Here’s an exclusive interview with Marten ...
Expert says coordinated disclosure is a form of censorship After Google disclosed a second Microsoft vulnerability, complete with proof-of-concept code, the software giant accused them of playing ...
Experts say many factors affect the coordinated vulnerability disclosure process, which can confuse CISOs and sometimes leave them clueless about the extent of the vulnerabilities reported.
Billington Global Automotive Cybersecurity Summit panel on coordinated vulnerability disclosure programs. Credit: CSPAN Back in July 2016 at the first-ever Billington Global Automotive ...
The FTC also noted that the Template offers companies “an adaptable model for implementing a vulnerability disclosure policy appropriately tailored to the company’s size and resources.” ...
Cyber group calls for coordinated vulnerability disclosure policies By Derek B. Johnson March 7, 2019 ...