VMware confirmed that exploit code for CVE-2023-20864 has been published, underscoring the urgency for enterprise network admins to apply available patches.
Hi, what are you looking for?
VMware confirmed that exploit code for CVE-2023-20864 has been published, underscoring the urgency for enterprise network admins to apply available patches.
Private equity giant plans to buy Forcepoint’s Global Governments and Critical Infrastructure (G2CI) business unit for $2.5 billion.
Facing ransomware zero-days, Progress Software will release regular service packs to help customers mitigate critical security flaws.
Hackers linked to the Truebot malware are exploiting a year-old Netwrix Auditor flaw to break into organizations in the U.S. and Canada.
Infisical banks $2.8 million in seed funding as investors continue to bet on companies in the software supply chain security space.
New York startup $30 million in new financing to fuel plans to take advantage of the demand for AI-powered threat-intel security tools.
Tel Aviv startup scores investment to build technology to secure in-house low-code/no-code custom applications.
New York startup scores early stage financing to build new technology to replace virtual desktop infrastructure.
HashiCorp acquires BluBracket secrets-scanning technology to help businesses block accidental leaks and fight secret sprawl.
Cyera closes a massive $100 million round as investors continue to pour cash into the data security posture management (DSPM) space.
CalypsoAI is building tools to help “accelerate trust and governance” in enterprise adoption of AI and machine learning technologies.
VMware updates a critical-level bulletin: “VMware has confirmed that exploitation of CVE-2023-20887 has occurred in the wild.”