Source
DARKReading
HIPAA compliance does not equal security, as continuing attacks on healthcare organizations show. Medical devices need to be secured.
Enterprises need to create a secure structure for tracking, assessing, and monitoring their growing stable of AI business apps.
A spoofed version of the popular RedAlert app collects sensitive user data on Israeli citizens, including contacts, call logs, SMS account details, and more.
No patch or workaround is currently available for the maximum severity flaw, which allows attackers to gain complete administrator privilege on affected devices remotely and without authentication.
A threat group known as "Void Rabisu" used a spoofed Women Political Leaders Summit website to target attendees to the actual conference with espionage malware.
Feeling creative? Submit your caption and our panel of experts will reward the winner with a $25 Amazon gift card.
It's been a year since its last communication and attack on Iran — but the conflict with Hamas appears to have reactivated the group.
By using data to drive policy underwriting, cyber-insurance companies can offer coverage without a price tag that drives customers away.
SaaS security is broad, possibly confusing, but undeniably crucial. Make sure you have the basics in place: discovery, risk assessment, and user access management.