The devices have been added to the NATO Information Assurance Product Catalogue (NIAPC).
The post Apple iPhone and iPad Cleared for Classified NATO Use appeared first on SecurityWeek.
Category Added in a WPeMatico Campaign
The devices have been added to the NATO Information Assurance Product Catalogue (NIAPC).
The post Apple iPhone and iPad Cleared for Classified NATO Use appeared first on SecurityWeek.
The goal isn’t about preventing every attack but about keeping the business running when attacks succeed.
The post Four Risks Boards Cannot Treat as Background Noise appeared first on SecurityWeek.
Anthropic has patched vulnerabilities whose impact was demonstrated by Check Point via malicious configuration files.
The post Claude Code Flaws Exposed Developer Devices to Silent Hacking appeared first on SecurityWeek.
The seed and Series A investment will enable the startup to accelerate product development and expand sales and customer success teams.
The post Gambit Security Emerges From Stealth With $61 Million in Funding appeared first on SecurityWeek.
The issue impacts the UPnP function of multiple device models and could be exploited for remote code execution.
The post Zyxel Patches Critical Vulnerability in Many Device Models appeared first on SecurityWeek.
The broker acquired eight zero-day exploits from a US defense contractor executive jailed for his actions.
The post US Sanctions Russian Exploit Broker Operation Zero appeared first on SecurityWeek.
TrendAI has fixed eight critical and high-severity issues in Windows and macOS endpoint security products.
The post Trend Micro Patches Critical Apex One Vulnerabilities appeared first on SecurityWeek.
Already added to CISA’s KEV catalog, the flaw allows attackers to bypass authentication and gain administrative privileges.
The post Cisco Patches Catalyst SD-WAN Zero-Day Exploited by Highly Sophisticated Hackers appeared first on SecurityWeek.
More than half (56%) of the 400,000 vulnerabilities IBM X-Force tracked in 2025 required no authentication before exploitation.
The post The Blast Radius Problem: Stolen Credentials are Weaponizing Agentic AI appeared first on SecurityWeek.
The UNC2814 threat actor has been active since at least 2017, targeting organizations across 42 countries.
The post Google Disrupts Chinese Cyberespionage Campaign Targeting Telecoms, Governments appeared first on SecurityWeek.
