Security
Headlines
HeadlinesLatestCVEs

Source

DARKReading

Protect Critical Infrastructure With Same Rigor as Classified Networks

Government security processes are often viewed as tedious and burdensome — but applying the lessons learned from them is imperative for private industry to counter a nation-state threat.

DARKReading
#mac#intel
Uber's Ex-CISO Appeals Conviction Over 2016 Data Breach

Joe Sullivan's lawyers have claimed his conviction on two felony charges is based on tenuous theories and criminalizes the use of bug bounty programs.

Pan-African Financial Apps Leak Encryption, Authentication Keys

Cryptocurrency apps were the most high risk for exposing sensitive information, a reverse-engineering study shows.

New California Delete Act Tightens Rules for Data Brokers

Companies with customers in California need to prepare for a new process for demanding deletion of personal data.

Chinese 'Stayin' Alive' Attacks Dance Onto Targets With Dumb Malware

A sophisticated APT known as "ToddyCat," sponsored by Beijing, is cleverly using unsophisticated malware to keep defenders off their trail.

Curl Bug Hype Fizzles After Patching Reveal

Touted for days as potentially catastrophic, the curl flaws only impact a narrow set of deployments.

Microsoft: Chinese APT Behind Atlassian Confluence Attacks; PoCs Appear

Organizations should brace for mass exploitation of CVE-2023-22515, an uber-critical security bug that opens the door to crippling supply chain attacks on downstream victims.

Cloud Security Demand Drives Better Cyber-Firm Valuations — and Deals

Cisco's $28 billion purchase of Splunk was the biggest story, but there were other big security acquisitions and investments during a richer-than-expected quarter.

Adobe Acrobat Reader Vuln Now Under Attack

CISA flags use-after-free bug now being exploited in the wild.

Gaza Conflict: How Israeli Cybersecurity Will Respond

The Israeli-Hamas war will most assuredly impact businesses when it comes to ramped-up cyberattacks. Experts say that Israel's considerable collection of cybersecurity vendors be a major asset on the cyber-front.