SecurePurdue, IT, and Purdue at large offer a variety of security-related services to help the University community achieve the goals of the SecurePurdue initiative. Use the links below to access ...
Examine how strengthening the security of banking applications throughout the software development lifecycle can enhance ...
Data Theorem, Inc., a leading provider of modern application security testing and protection solutions for cloud-native, web, mobile, and API-based applications, today announced that it has been ...
Code scanning tools analyze memory handling operations to spot insecure practices, such as unchecked array indices, unsafe copying functions, or insufficient buffer allocation. Preventing buffer ...
Microsoft has confirmed it recently fixed its “highest ever” vulnerability plaguing its ASP.NET Core product. Described as an ...
A cyber campaign using Nezha has been identified, targeting vulnerable web apps with PHP web shells and Ghost RAT ...
The China-based APT group Flax Typhoon used a function within ArcGIS' legitimate geo-mapping software to create a webshell ...
F5 has disclosed that an August breach exposed source code and customer data to what it calls "nation-state hackers." The ...
Network Infrastructure & Security are the foundation any day even in the AI era. The evolution of artificial intelligence, ...
Amazon Web Services, a major provider of cloud services for companies, said most services were back up after an issue caused ...
Huntress reports active exploitation of Gladinet CVE-2025-11371, exposing system files and enabling remote code execution.
Microsoft confirms a new Windows 11 issue affecting the Recovery Environment, with an emergency update now rolling out to ...