Security
Headlines
HeadlinesLatestCVEs

Source

DARKReading

Intel Harnesses Hackathons to Tackle Hardware Vulnerabilities

The semiconductor manufacturing giant's security team describes how hardware hackathons, such as Hack@DAC, have helped chip security by finding and sharing hardware vulnerabilities.

DARKReading
#vulnerability#google#cisco#intel#auth
Held Back: What Exclusion Looks Like in Cybersecurity

You can't thinking about inclusion in the workplace without first understanding what kinds of exclusive behaviors prevent people from advancing in their careers.

Palo Alto Updates Remediation for Max-Critical Firewall Bug

Though PAN originally described the attacks exploiting the vulnerability as being limited, they are increasingly growing in volume, with more exploits disclosed by outside parties.

CISO Corner: Evil SBOMs; Zero-Trust Pioneer Slams Cloud Security; MITRE's Ivanti Issue

Our collection of the most relevant reporting and industry perspectives for those guiding cybersecurity strategies and focused on SecOps. Also included: security license mandates; a move to four-day remediation requirements; lessons on OWASP for LLMs.

Cyberattack Gold: SBOMs Offer an Easy Census of Vulnerable Software

Attackers will likely use software bills-of-material (SBOMs) for searching for software potentially vulnerable to specific software flaws.

Minimum Viable Compliance: What You Should Care About and Why

Understand what security measures you have in place, what you need to keep secure, and what rules you have to show compliance with.

Military Tank Manual, 2017 Zero-Day Anchor Latest Ukraine Cyberattack

The targeted operation utilized CVE-2017-8570 as the initial vector and employed a notable custom loader for Cobalt Strike, yet attribution to any known threat actor remains elusive.

PCI Launches Payment Card Cybersecurity Effort in the Middle East

The payment card industry pushes for more security in financial transactions to help combat increasing fraud in the region.

Chinese Keyboard Apps Open 1B People to Eavesdropping

Eight out of nine apps that people use to input Chinese characters into mobile devices have weakness that allow a passive eavesdropper to collect keystroke data.

FTC Issues $5.6M in Refunds to Customers After Ring Privacy Settlement

The refunds will be made to individual affected customers through thousands of PayPal payments, available to be redeemed for a limited time.