Source
DARKReading
It's time to include messaging tool security in your cloud security program. Good first steps include tightening filter parameters on Slack and Teams.
By paying attention to emerging threat intelligence, security leaders can be better prepared to defend against similar attack vectors in the future.
The June 2023 Patch Tuesday security update included fixes for a bypass for two previously addressed issues in Microsoft Exchange and a critical elevation of privilege flaw in SharePoint Server.
Threat actors have grown increasingly sophisticated in applying social engineering tactics against their victims, which is key to this oft-underrated cybercriminal scam's success.
Mandiant's ongoing investigation of UNC3886 has uncovered new details of threat actors' TTPs.
Threat actors have created over 3,000 domains, some as old as two years, to lure in customers to false, name brand websites for personal financial gain.
The average cost of a data breach is $4.35 million. Understand the power of public key infrastructure (PKI) and its role in encrypting data and battling breaches.
Vendors and buyers both have the power to make the industry a better place. What's needed is more collaboration, mutual support, and respect.
While protecting critical infrastructure seems daunting, here are some critical steps the industry can take now to become more cyber resilient and mitigate risks.