Application Security
Breaking news, news analysis, and expert commentary on application security, including tools & technologies.
Sharks circling a computer
Threat IntelligenceThousands of Buggy BeyondTrust Systems Remain ExposedThousands of Buggy BeyondTrust Systems Remain Exposed
Weeks after the critical vulnerability was reported and a hacking of the Treasury Department, nearly 9,000 BeyondTrust instances remain wide open to the Internet, researchers say.