Skip to content
Trending
  • 3 Things to Do Today to Help Combat the Gender Gap in Cybersecurity

  • Akamai: Look for IoT devices to attack during Thanksgiving, Christmas

  • IoT security: Defending a young industry from attack

  • ROOT9B announces launch of cyber hunt certification for commercial sector

Cyber Security Minute

Cyber Security Minute

  • Featured
  • Security Blogs
  • Announcement Center
  • Contact

security experts

Vulnerabilities

Intel Confirms UEFI Source Code Leak as Security Experts Raise Concerns

Issued by: Security Week

Last week, someone announced leaking source code associated with the Alder Lake BIOS — Alder Lake is Intel’s codename for its 12th generation Core processors. The files total nearly 6 Gb and they were made public on GitHub and other websites. Mark Ermolov, a security researcher who specializes in Intel products, analyzed the leaked code…

Continue reading

Press Releases Sources

  • Proofpoint
  • Proofpoint, Inc.
  • Malwarebytes
  • Ziften
  • Cision
  • R9B
  • ThreatQuotient
  • Cofense
  • Gemalto
  • Cybereason
  • Fortinet
  • Press Release
  • Karamba Security
  • Symantec,
  • SecureWorks
  • BlackBerry
  • Threat Stack
  • Zscaler
  • Sera-Brynn
  • CyberArk
  • Symantec
  • Sophos
  • TrapX
  • Juniper
  • OneLogin
  • Kaspersky Lab
  • Juniper Networks
  • Digital Guardian
  • PhishMe
  • HyTrust
  • Check Point Software Technologies Ltd.
  • CheckPoint
  • Dimension Data
  • Full Disclosure
  • Tenable
  • Imprivata
  • Resilient
  • KnowBe4
  • Trend Micro
  • Gigamon
  • Cryptzone
  • Carbon Black
  • Panda Security Mediacenter
  • Cylance
  • Tripwire
  • A10 Networks
  • Elevate Security
  • Vasco
  • Imperva
  • Illumio
  • Sans
  • Herjavec Group
  • LightCyber
  • Code Dx
  • Rapid7
  • Resilient Systems
  • Corero
  • CodeDx
  • Black Duck
  • ESET
  • Eset
  • Read More
  • Cisco
  • Cisco, Hue
  • Check Point Research
  • BitDefender
  • Booz Allen Hamilton
  • Cisco
  • Webroot
  • Check Point
  • Emsisoft
  • CounterTack
  • Patch Tuesday
  • Qualys
  • BitSight
  • root9B
  • AVG
  • Sans Institute
  • Booz Allen
  • BAE Systems
  • DHS
  • VMware
  • Avast
  • Cybrary
  • rootB9
  • IBM
  • Terbium Labs
  • Kaspersky
  • FireEye

Recent Press Releases

  • <i class="fa fa-newspaper-o" aria-hidden="true"></i> Gegagedigedagedago, BABYMONSTER and My Story Animated: children’s online trends over the past year
  • <i class="fa fa-newspaper-o" aria-hidden="true"></i> AT&T and Cisco Introduce a Simpler Way to Deploy 5G Fixed Wireless Access for Businesses
  • <i class="fa fa-newspaper-o" aria-hidden="true"></i> Unveiling the key findings of the SANS Institute 2024 Cyber Threat Intelligence survey
  • <i class="fa fa-newspaper-o" aria-hidden="true"></i> Gigamon Showcases Deep Observability Pipeline to Attendees at Cisco Live 2024
  • <i class="fa fa-newspaper-o" aria-hidden="true"></i> Juniper Networks Assures Exceptional Wired and Wireless Experiences with Continuous Learning, Expanded Digital Experience Twinning and Simplified Access Control
  • <i class="fa fa-newspaper-o" aria-hidden="true"></i> Cisco Schedules Conference Call for Q3 Fiscal Year 2024 Financial Results

Blog Sources

  • Dark Reading
  • Help Net Security
  • Trend Micro Blog
  • Malwarebytes
  • Symantec Blog
  • IKANOW
  • Linux Blog
  • Splunk
  • Black Duck
  • CyberArk Blog
  • Kaspersky Blog
  • CSO
  • Panda Security
  • Security Intelligence
  • SecurityWeek
  • Eset
  • Blog Malwarebytes
  • DataBreach Today
  • Security Week
  • The Hacker News
  • CSO Online
  • Security Affairs
  • Naked Security
  • CIO Security
Advertisement

Recent Posts

  • The top new cybersecurity products at Black Hat USA 2024

  • Critical Apache OFBiz Vulnerability Allows Preauth RCE

  • China’s APT41 Targets Taiwan Research Institute for Cyber Espionage

  • A ransomware attack disrupted operations at OneBlood blood bank

Security Blogs Categories

  • Application Security
  • Cloud Security
  • Malware & Threats
  • Mobile Security
  • Network Security
  • News
  • Software Security
  • Vulnerabilities

Security Blogs Archive

  • August 2024 (3)
  • July 2024 (32)
  • June 2024 (25)
  • May 2024 (24)
  • April 2024 (14)
  • March 2024 (9)
  • February 2024 (22)
  • January 2024 (31)
  • December 2023 (34)
  • November 2023 (35)
  • October 2023 (34)
  • September 2023 (36)
  • August 2023 (23)
  • July 2023 (20)
  • June 2023 (29)
  • May 2023 (27)
  • April 2023 (30)
  • March 2023 (52)
  • February 2023 (56)
  • January 2023 (52)
  • December 2022 (38)
  • November 2022 (43)
  • October 2022 (53)
  • September 2022 (45)
  • August 2022 (44)
  • July 2022 (42)
  • June 2022 (43)
  • May 2022 (40)
  • April 2022 (39)
  • March 2022 (36)
  • February 2022 (32)
  • January 2022 (43)
  • December 2021 (44)
  • November 2021 (45)
  • October 2021 (62)
  • September 2021 (56)
  • August 2021 (51)
  • July 2021 (43)
  • June 2021 (47)
  • May 2021 (38)
  • April 2021 (50)
  • March 2021 (63)
  • February 2021 (43)
  • January 2021 (43)
  • December 2020 (47)
  • November 2020 (43)
  • October 2020 (43)
  • September 2020 (44)
  • August 2020 (37)
  • July 2020 (46)
  • June 2020 (39)
  • May 2020 (35)
  • April 2020 (37)
  • March 2020 (34)
  • February 2020 (39)
  • January 2020 (36)
  • December 2019 (22)
  • November 2019 (29)
  • October 2019 (34)
  • September 2019 (32)
  • August 2019 (24)
  • July 2019 (32)
  • June 2019 (32)
  • May 2019 (39)
  • April 2019 (24)
  • March 2019 (30)
  • February 2019 (30)
  • January 2019 (28)
  • December 2018 (16)
  • November 2018 (29)
  • October 2018 (25)
  • September 2018 (31)
  • August 2018 (36)
  • July 2018 (24)
  • June 2018 (33)
  • May 2018 (35)
  • April 2018 (31)
  • March 2018 (42)
  • February 2018 (39)
  • January 2018 (31)
  • December 2017 (30)
  • November 2017 (37)
  • October 2017 (48)
  • September 2017 (50)
  • August 2017 (45)
  • July 2017 (46)
  • June 2017 (46)
  • May 2017 (46)
  • April 2017 (46)
  • March 2017 (74)
  • February 2017 (59)
  • January 2017 (61)
  • December 2016 (84)
  • November 2016 (101)
  • October 2016 (66)
  • September 2016 (1)
  • July 2016 (1)
  • June 2016 (3)
  • May 2016 (4)
  • April 2016 (1)

About Us

Cyber Security Minute delivers constantly updated press releases and blog posts covering today's cyber-security issues.

Whether you're looking for updates on the latest cyber threats, or for new solutions to protect your business, our editorial team will keep you informed with a fresh stream of news
Copyright © . All rights reserved | Privacy Policy | Privacy Policy for California Residents | LGPD | GDPR | Cookie Policy
Back to top