Security
Headlines
HeadlinesLatestCVEs

Source

DARKReading

Why Zero Trust Is the Cloud Security Imperative

The security principle of zero trust is the cornerstone of robust cloud security.

DARKReading
#web#git#aws#auth
How MOVEit Is Likely to Shift Cyber Insurance Calculus

Progress Software plans to collect millions in cyber insurance policy payouts after the MOVEit breaches, which will make getting coverage more expensive and harder to get for everyone else, experts say.

Feds: Beware AvosLocker Ransomware Attacks on Critical Infrastructure

CISA and FBI warn the RaaS provider's affiliates are striking critical industries, with more attacks expected to come from additional ransomware groups in the months ahead.

Security Pros Warn That EU's Vulnerability Disclosure Rule Is Risky

The Cyber Resilience Act's requirement to disclose vulnerabilities within 24 hours could expose organizations to attacks — or government surveillance.

ShellBot Cracks Linux SSH Servers, Debuts New Evasion Tactic

The botnet — built for DDoS, backdooring, and dropping malware — is evading standard URL signature detections with a novel approach involving Hex IP addresses.

Microsoft Debuts AI Bug-Bounty Program, Offers $15K

The goal of the program is to uncover critical or important vulnerabilities within the AI-powered Bing program.

Gaza Conflict Paves Way for Pro-Hamas Information Operations

Mandiant's John Hultquist says to expect anti-Israel influence and espionage campaigns to ramp up as the war grinds on.

Passkeys Are Cool, but They Aren't Enterprise-Ready

Apple, Google, and Microsoft are promoting passkeys as a solution for accounts recovery, but enterprises are slow-walking their adoption.

What the Hollywood Writers Strike Resolution Means for Cybersecurity

The writers' strike shows that balancing artificial intelligence and human ingenuity is the best possible outcome for creative as well as cybersecurity professionals.

Making the Case for Cryptographic Agility and Orchestration

Finding the right post-quantum cryptographic (PQC) algorithms is necessary, but not sufficient, to future-proof cybersecurity.