None
<p><span style="font-weight: 400;">Wi-Fi routers are not exactly the stuff of geopolitical drama. For most of the internet era, they have been one of those quiet little boxes you plug in once and forget about until the signal drops and someone in the house starts yelling that the internet is down. Yet suddenly, routers are making national headlines. <a href="https://docs.fcc.gov/public/attachments/DOC-420034A1.pdf" target="_blank" rel="noopener">The Federal Communications Commission recently moved to ban the sale of new foreign-made Wi-Fi routers in the United States</a>, citing national security concerns and the risk that vulnerabilities in networking equipment could be exploited by foreign actors.</span></p><p><span style="font-weight: 400;">That sounds serious. It also sounds familiar. This isn’t the first time Washington has discovered a piece of everyday technology and decided it is suddenly a national security issue. Over the past decade, policymakers have repeatedly turned their attention to hardware supply chains, from telecom equipment to drones and now to consumer networking gear. Each time the debate starts with sweeping warnings about national security threats and ends with a far more complicated reality once the global technology supply chain enters the conversation.</span></p><p><span style="font-weight: 400;">When broadband first began showing up in homes in the late 1990s, routers were hardly political. Most people did not even know what one was. If you had DSL or a cable modem in those days, chances are one computer in the house was plugged directly into it. Then, small consumer routers began appearing on store shelves. Enterprise vendors had been building routers for the backbone of the internet for years, but companies like Linksys suddenly made them accessible to ordinary households. I remember helping friends set them up so that two computers in the house could share a single internet connection. It felt almost magical at the time. Plug the modem into the router, run a couple of cables, maybe set a password if you were feeling ambitious, and suddenly the entire house was online.</span></p><p><span style="font-weight: 400;">Nobody asked where the router had been manufactured. Nobody in Washington was debating whether routers posed a national security threat. We were just trying to get the internet working.</span></p><p><span style="font-weight: 400;">Fast forward twenty-five years, and routers have somehow become the latest villain in the geopolitics of technology. Count me among the critics of the latest proposal. Washington has developed a habit of announcing sweeping bans on foreign technology as if drawing a bright red line around hardware will somehow make our networks safer. First, it was telecom equipment. Then it was drones. Now it is Wi-Fi routers. The rhetoric is always dramatic. Politicians promise to protect American infrastructure from foreign threats and frame the move as a decisive step toward cybersecurity.</span></p><p><span style="font-weight: 400;">In practice, the story rarely unfolds that way. These policies usually collide with a simple fact that anyone who has spent time in the technology industry understands well. The global technology supply chain does not align neatly with political messaging. Networking gear is designed in one country, built in another, filled with chips from several more and assembled somewhere else entirely. Even companies Americans think of as domestic brands depend heavily on global manufacturing. That model evolved over decades because it allowed companies to innovate faster and produce hardware at scale. Trying to redraw those supply chains overnight through regulatory bans is not realistic.</span></p><p><span style="font-weight: 400;">This is why similar policies almost always end up producing waivers and conditional approvals. Industry raises concerns, regulators recognize the lack of immediate domestic alternatives, and the sweeping ban gradually turns into a narrower set of restrictions with exceptions built in. We saw it with telecom equipment. We saw it with drones. We are likely to see it again with routers.</span></p><p><span style="font-weight: 400;">Zooming out reveals an even broader pattern. For decades, Washington largely ignored where technology hardware was manufactured. The focus was on innovation and economic growth as the internet transformed the economy. Over time, the strategic importance of infrastructure became clearer, and policymakers began worrying about supply chain trust. Telecom networks were the first major battleground as governments moved to restrict equipment from certain vendors. Drones soon followed as concerns grew about foreign manufacturers dominating the global market. Now routers have entered the same policy cycle.</span></p><p><span style="font-weight: 400;">The timing is not surprising. Routers sit at the edge of almost every home and small business network. They are a natural place for attackers to gain persistent access. But focusing primarily on where routers are manufactured risks missing the larger operational security problem that has existed for years.</span></p><p><span style="font-weight: 400;">That problem is firmware and device lifecycle management. Millions of routers currently running in homes and small businesses are operating with outdated software that has not been updated in years. Many devices quietly reach end of life without users ever realizing that security patches have stopped. Others still use default credentials or expose remote management features that attackers can exploit. Security researchers have been warning about this situation for more than a decade. These vulnerabilities exist regardless of whether the router was assembled in Taiwan, Vietnam or Texas.</span></p><p><span style="font-weight: 400;">In other words, the most common weaknesses in home networking have nothing to do with geography. They have everything to do with maintenance, updates and accountability.</span></p><p><span style="font-weight: 400;">If policymakers truly want to improve router security, the answer lies there rather than in manufacturing bans. Vendors should be required to provide longer firmware support windows and clear end-of-life disclosure so consumers understand when a device will stop receiving security updates. Secure update mechanisms should make patching automatic rather than optional. Consumers and small businesses should not be expected to track firmware updates manually for devices that sit quietly in a closet for years.</span></p><p><span style="font-weight: 400;">Those steps would do far more to improve the security of home networks than attempting to redraw the global manufacturing map for consumer electronics.</span></p><p><span style="font-weight: 400;">Routers may not be glamorous technology, but they are foundational infrastructure for the modern internet. They deserve thoughtful policy and serious industry attention. Cybersecurity, however, is rarely solved through dramatic announcements. It is built through steady operational work. Patches, updates and responsible device lifecycle management matter far more than the country stamped on the bottom of the box.</span></p><p><span style="font-weight: 400;">An insecure router is an insecure router, no matter where it was built.</span></p><div class="spu-placeholder" style="display:none"></div><div class="addtoany_share_save_container addtoany_content addtoany_content_bottom"><div class="a2a_kit a2a_kit_size_20 addtoany_list" data-a2a-url="https://securityboulevard.com/2026/04/banning-routers-wont-secure-the-internet/" data-a2a-title="Banning Routers Won’t Secure the Internet"><a class="a2a_button_twitter" href="https://www.addtoany.com/add_to/twitter?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Fbanning-routers-wont-secure-the-internet%2F&linkname=Banning%20Routers%20Won%E2%80%99t%20Secure%20the%20Internet" title="Twitter" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Fbanning-routers-wont-secure-the-internet%2F&linkname=Banning%20Routers%20Won%E2%80%99t%20Secure%20the%20Internet" title="LinkedIn" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Fbanning-routers-wont-secure-the-internet%2F&linkname=Banning%20Routers%20Won%E2%80%99t%20Secure%20the%20Internet" title="Facebook" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_reddit" href="https://www.addtoany.com/add_to/reddit?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Fbanning-routers-wont-secure-the-internet%2F&linkname=Banning%20Routers%20Won%E2%80%99t%20Secure%20the%20Internet" title="Reddit" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_email" href="https://www.addtoany.com/add_to/email?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Fbanning-routers-wont-secure-the-internet%2F&linkname=Banning%20Routers%20Won%E2%80%99t%20Secure%20the%20Internet" title="Email" rel="nofollow noopener" target="_blank"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share"></a></div></div>
None
<p>A landmark jury verdict has found Meta and YouTube negligent in a social media addiction case, raising major questions about platform accountability and legal protections under Section 230.</p><p>This episode covers the details of the case, why the ruling is significant, and what it could mean for the future of social media, privacy, and cybersecurity. Could this trigger a wave of lawsuits against tech companies? And are platforms finally being held accountable?</p><p><strong>** Links mentioned on the show **</strong><strong><br>
</strong></p><p><strong>Jury rules against Meta, YouTube in bellwether teen addiction case</strong><br>
<a href="https://www.businessinsider.com/social-media-addiction-trial-jury-verdict-meta-youtube-negligent-2026-3">https://www.businessinsider.com/social-media-addiction-trial-jury-verdict-meta-youtube-negligent-2026-3</a></p><p><strong>Meta, YouTube verdict could trigger cascade of social media lawsuits: expert</strong><br>
<a href="https://www.ktvu.com/news/expert-says-meta-youtube-verdict-could-trigger-cascade-social-media-lawsuits">https://www.ktvu.com/news/expert-says-meta-youtube-verdict-could-trigger-cascade-social-media-lawsuits</a></p><p><strong>The Social Dilemma Documentary</strong><br>
<a href="https://thesocialdilemma.com/">https://thesocialdilemma.com/</a></p><p><!-- notionvc: 914238f3-2848-4152-a0f7-8176e1e0f4bd --></p><p><!-- notionvc: 19e1e7bd-eaa3-45c6-abe8-0849e0889c4f --></p><p><!-- notionvc: ae2b6536-287f-4dcb-89b2-fc14c9575985 --></p><p><!-- notionvc: 5c9611f2-5f49-4d60-bdd7-b69ebea22814 --></p><p><!-- notionvc: 17d9bc6d-8c44-4a36-9db1-17fde342d397 --></p><p><!-- notionvc: e3de0f66-e26f-4a06-b2a7-4816aa9d48a3 --></p><p><!-- notionvc: 91530a67-bb76-4ae0-bc72-6f9fa0abe6bd --></p><p><!-- notionvc: fc12dc07-4fad-4bf7-af27-608e52408c03 --></p><p><!-- notionvc: acf4c416-cc6b-426a-b4cd-4c9f66df6cb6 --></p><p><!-- notionvc: 88a160a5-1f28-444a-aacb-c577fab234c7 --><!-- notionvc: 4c797aac-e61c-4709-bfde-9b44b7533e21 --></p><p><!-- notionvc: 9c5c40e5-5031-4e60-8b50-66bc37374346 --></p><p><!-- notionvc: f403c979-1a0d-4041-9f6c-1d9d477f473e --></p><p><strong>** Watch this episode on YouTube **</strong></p><p><iframe title="Meta & YouTube Lose Major Case — What Happens Next?" width="1102" height="620" src="https://www.youtube.com/embed/UNVP7ABOkwU?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p><p><strong>** Become a Shared Security Supporter **</strong></p><p>Get exclusive access to bonus episodes, listen to new episodes before they are released, receive a monthly shout-out on the show, and get a discount code for 15% off merch at the Shared Security store. Become a supporter today by going to our YouTube channel’s membership section: <a href="https://www.youtube.com/channel/UCg9CCDIYkDDqwEZ3UYaxjnA/join">https://www.youtube.com/channel/UCg9CCDIYkDDqwEZ3UYaxjnA/join</a></p><p><strong>** Thank you to our sponsors! **</strong></p><p><strong>SLNT</strong></p><p>Visit <a href="https://www.avantlink.com/click.php?tt=cl&merchant_id=364b46a6-e620-4c44-bb24-6b4d59b0af40&website_id=430328bd-a1b1-499e-a241-f5aa426345c2&url=https%3A%2F%2Fslnt.com">slnt.com</a> to check out SLNT’s amazing line of Faraday bags and other products built to protect your privacy. As a listener of this podcast you receive 10% off your order at checkout using discount code “sharedsecurity”.</p><p><strong>** Subscribe and follow the podcast **</strong></p><p>Subscribe on YouTube: <a href="https://www.youtube.com/c/SharedSecurityPodcast">https://www.youtube.com/c/SharedSecurityPodcast</a></p><p>Follow us on Bluesky: <a href="https://bsky.app/profile/sharedsecurity.bsky.social">https://bsky.app/profile/sharedsecurity.bsky.social</a></p><p>Follow us on Mastodon: <a href="https://infosec.exchange/@sharedsecurity">https://infosec.exchange/@sharedsecurity</a></p><p>Join us on Reddit: <a href="https://www.reddit.com/r/SharedSecurityShow/">https://www.reddit.com/r/SharedSecurityShow/</a></p><p>Visit our website: <a href="https://sharedsecurity.net/">https://sharedsecurity.net</a></p><p>Subscribe on your favorite podcast app: <a href="https://sharedsecurity.net/subscribe">https://sharedsecurity.net/subscribe</a></p><p>Sign-up for our email newsletter to receive updates about the podcast, contest announcements, and special offers from our sponsors: <a href="https://shared-security.beehiiv.com/subscribe">https://shared-security.beehiiv.com/subscribe</a></p><p>Leave us a rating and review: <a href="https://ratethispodcast.com/sharedsecurity">https://ratethispodcast.com/sharedsecurity</a></p><p>Contact us: <a href="https://sharedsecurity.net/contact">https://sharedsecurity.net/contact</a></p><p>The post <a href="https://sharedsecurity.net/2026/04/06/meta-youtube-found-negligent-a-turning-point-for-big-tech/">Meta & YouTube Found Negligent: A Turning Point for Big Tech?</a> appeared first on <a href="https://sharedsecurity.net/">Shared Security Podcast</a>.</p><div class="spu-placeholder" style="display:none"></div><div class="addtoany_share_save_container addtoany_content addtoany_content_bottom"><div class="a2a_kit a2a_kit_size_20 addtoany_list" data-a2a-url="https://securityboulevard.com/2026/04/meta-youtube-found-negligent-a-turning-point-for-big-tech/" data-a2a-title="Meta & YouTube Found Negligent: A Turning Point for Big Tech?"><a class="a2a_button_twitter" href="https://www.addtoany.com/add_to/twitter?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Fmeta-youtube-found-negligent-a-turning-point-for-big-tech%2F&linkname=Meta%20%26%20YouTube%20Found%20Negligent%3A%20A%20Turning%20Point%20for%20Big%20Tech%3F" title="Twitter" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Fmeta-youtube-found-negligent-a-turning-point-for-big-tech%2F&linkname=Meta%20%26%20YouTube%20Found%20Negligent%3A%20A%20Turning%20Point%20for%20Big%20Tech%3F" title="LinkedIn" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Fmeta-youtube-found-negligent-a-turning-point-for-big-tech%2F&linkname=Meta%20%26%20YouTube%20Found%20Negligent%3A%20A%20Turning%20Point%20for%20Big%20Tech%3F" title="Facebook" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_reddit" href="https://www.addtoany.com/add_to/reddit?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Fmeta-youtube-found-negligent-a-turning-point-for-big-tech%2F&linkname=Meta%20%26%20YouTube%20Found%20Negligent%3A%20A%20Turning%20Point%20for%20Big%20Tech%3F" title="Reddit" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_email" href="https://www.addtoany.com/add_to/email?linkurl=https%3A%2F%2Fsecurityboulevard.com%2F2026%2F04%2Fmeta-youtube-found-negligent-a-turning-point-for-big-tech%2F&linkname=Meta%20%26%20YouTube%20Found%20Negligent%3A%20A%20Turning%20Point%20for%20Big%20Tech%3F" title="Email" rel="nofollow noopener" target="_blank"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share"></a></div></div><p class="syndicated-attribution">*** This is a Security Bloggers Network syndicated blog from <a href="https://sharedsecurity.net/">Shared Security Podcast</a> authored by <a href="https://securityboulevard.com/author/0/" title="Read other posts by Tom Eston">Tom Eston</a>. Read the original post at: <a href="https://sharedsecurity.net/2026/04/06/meta-youtube-found-negligent-a-turning-point-for-big-tech/">https://sharedsecurity.net/2026/04/06/meta-youtube-found-negligent-a-turning-point-for-big-tech/</a> </p>
This week on the Lock and Code podcast, we speak with Peter Asaro about killer robots, how to stop them, and their obvious consequences.
Big news: Lock and Code is nominated for a Webby Award! You can help us win the People’s Voice Award by voting here.
This week on the Lock and Code podcast…
We have to talk about killer robots. No,… [+3210 chars]
As Karoline Leavitt gears up to welcome her second child, there's chatter on who will fill her role during her maternity leave... Leavitt, 28, is due in May, and three women in her press office are seen as potential stand-ins during her absence: Deputy Press …
Skip to comments.
Meet the glamorous MAGA frontrunners looking to replace White House press secretary Karoline Leavitt during maternity leaveDaily Mail ^
| 28 March 2026
| Alyssa Guzman
Posted… [+2162 chars]
Fortinet has released an emergency weekend security update for a new critical FortiClient Enterprise Management Server (EMS) vulnerability that is actively exploited in attacks. [...]
Fortinet has released an emergency weekend security update for a new critical FortiClient Enterprise Management Server (EMS) vulnerability that is actively exploited in attacks.
Tracked as CVE-2026-… [+1904 chars]
Iran’s Charming Kitten group relies on deception, insider access, and low-tech methods to steal trade secrets and compromise systems.
<ul><li>Charming Kitten relies on deception rather than exploiting technical software vulnerabilities</li><li>Fake identities build trust before phishing attacks compromise sensitive user credentials… [+4126 chars]
The FCC’s sweeping ban applies to the sale of virtually every new Wi-Fi router. Without regular updates, yours might turn into a pumpkin by 2027.
Key takeaways:
<ul><li>The Federal Communications Commission has banned the sale of new foreign-made routers in the US. The sweeping order applies to virtually every Wi-Fi router currently available… [+10677 chars]
Ledger’s Charles Guillemet says artificial intelligence is making hacks cheaper and faster, forcing a rethink of how crypto systems stay secure.
Crypto platforms and investors have long suffered from hacker attacks and exploits. Now, artificial intelligence (AI) is making that threat even worse.
Thats the view of Charles Guillemet, chief tec… [+2850 chars]
Meta suspends Mercor collaboration after breach Meta has suspended its work with Mercor, an AI data startup, as the company investigated a supply chain incident that exposed training secrets. The collaboration was paused while Meta assessed the scope of the e…
Meta suspends Mercor collaboration after breach
Meta has suspended its work with Mercor, an AI data startup, as the company investigated a supply-chain incident that exposed training secrets. The co… [+1671 chars]
ORLANDO, Fla. — Florida's artificial intelligence sector continues its rapid expansion in 2026, fueled by Miami's emergence as a tech hub, strong venture capital interest and demand for custom AI solutions across industries like cybersecurity, healthcare, fin…
ORLANDO, Fla. — Florida's artificial intelligence sector continues its rapid expansion in 2026, fueled by Miami's emergence as a tech hub, strong venture capital interest and demand for custom AI sol… [+6813 chars]
When Syrian government accounts were hijacked in March, the breach looked chaotic. But it revealed something more troubling: a state struggling with the most basic layer of cybersecurity.
When a wave of unusual activity swept through Syrian government accounts on X in March, it first looked like pure chaostrolling, parody names, and even explicit content. But beneath the noise lay som… [+4037 chars]
Canadian authorities are issuing a stern warning about a widespread text message scam. Fraudsters are impersonating legitimate class actions, specifically a fake milk settlement. These scams aim to trick people into revealing sensitive personal and financial …
Canadian authorities are warning of a rapidly spreading text-message scam falsely promising payouts from a non-existent milk settlement, as fraudsters exploit the credibility of legitimate class acti… [+1890 chars]
Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Financial groups lay out a plan to fight AI identity attacks Generative AI tools have brought the cost of deepfake production low enough that criminals and state…
Heres an overview of some of last weeks most interesting news, articles, interviews and videos:
Financial groups lay out a plan to fight AI identity attacksGenerative AI tools have brought the cost … [+14137 chars]
Geely-badged cars are new to the UK, but the brand is a volume-selling powerhouse at home in China
Until quite recently, Geely has been something of an automotive shadow in the UK, a background entity known mainly for its ownership of a number of familiar ca…
Alex has, for his sins, been making things about cars for longer than he was in full time education. Print, online, words, pictures, or video, hes happiest when theres something to shown to the wider… [+1923 chars]
Cybersecurity researchers have discovered 36 malicious packages in the npm registry that are disguised as Strapi CMS plugins but come with different payloads to facilitate Redis and PostgreSQL exploitation, deploy reverse shells, harvest credentials, and drop…
Cybersecurity researchers have discovered 36 malicious packages in the npm registry that are disguised as Strapi CMS plugins but come with different payloads to facilitate Redis and PostgreSQL exploi… [+10418 chars]
Zolan Kanno-Youngs / New York Times:
Trump Directs Officials to Pay All D.H.S. Employees — The memorandum calls for paying employees at the Coast Guard, Federal Emergency Management Agency and Cybersecurity and Infrastructure Security Agency who have gone w…
memeorandum is an auto-generated summary of the stories that US political commentators are discussing online right now.
Unlike sister sites Techmeme and Mediagazer, it is not a human-edited news out… [+72 chars]
CMMS opens new opportunities in U.S. defense contracts and accelerates federal expansion....
RAKIA Logo
WASHINGTON, April 04, 2026 (GLOBE NEWSWIRE) -- RAKIA
, a provider of advanced AI-powered data fusion intelligence and real-time decision support systems, today announced it has achieved … [+3165 chars]
March Madness is heating up with the Final Four. Learn how to watch Michigan vs. Arizona from anywhere.
The Final Four continues with a can't-miss battle of the remaining No. 1 seeds. We've gathered everything you need to know about how to watch Michigan vs. Arizona, including free and global streaming… [+6251 chars]
The controversy around Delve appears to have cost the compliance startup its relationship with accelerator Y Combinator.
The controversy around Delve appears to have cost the compliance startup its relationship with accelerator Y Combinator.
Delve is no longer listed among YCs directory of portfolio companies, and the… [+3412 chars]
The maintainers of the popular Axios HTTP client have published a detailed post-mortem describing how one of its developers was targeted by a social engineering campaign believed to have been conducted by North Korean threat actors. [...]
The maintainers of the popular Axios HTTP client have published a detailed post-mortem describing how one of its developers was targeted by a social engineering campaign linked to North Korean hacker… [+6939 chars]
In short: Meta has suspended its collaboration with Mercor, a $10 billion AI data startup, after a supply chain attack exposed what may be the AI industry’s most closely guarded secrets: not just personal data, but the training methodologies that power the wo…
In short: Meta has suspended its collaboration with Mercor, a $10 billion AI data startup, after a supply chain attack exposed what may be the AI industrys most closely guarded secrets: not just pers… [+8734 chars]
Before it's publicly available later this year, the Irish government is trialing its Government Digital Wallet, which includes a way to verify a user's age to access social media platforms. In its press release, the government's Department of Public Expeditur…
Before it's publicly available later this year, the Irish government is trialing its Government Digital Wallet, which includes a way to verify a user's age to access social media platforms. In its pr… [+1506 chars]
China and Vietnam are testing a new format of cooperation, building a more complete partnership for a changing Asia Read Full Article at RT.com
When China and Vietnam sat down in Hanoi on March 16 for their first-ever ‘3+3’ strategic dialogue, it marked the launch of a new kind of coordination – one that goes beyond the usual playbook.
Not … [+5946 chars]
LinkedIn is understood to inject a JavaScript fingerprinting script on every page load that probes visitors' browsers for 6,236 installed Chrome extensions and collects detailed device telemetry.
LinkedIn is understood to be injecting a JavaScript fingerprinting script into every page load that probes visitors' browsers for 6,236 installed Chrome extensions and collects detailed device teleme… [+3416 chars]
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds a flaw in TrueConf Client to its Known Exploited Vulnerabilities catalog The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added a flaw in TrueConf Client, tracked as CVE-202…
U.S. CISA adds a flaw in TrueConf Client to its Known Exploited Vulnerabilities catalog
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added a flaw in TrueConf Client, tracked as C… [+2601 chars]