Source
DARKReading
Recent trends in breaches and attack methods offer a valuable road map to cybersecurity professionals tasked with detecting and preventing the next big thing.
Hackers can influence voters with media and breach campaigns, or try tampering with votes. Or they can combine these tactics to even greater effect.
Mobile malware-as-a-service operators are upping their game by automatically churning out hundreds of unique samples on a whim.
Caliptra 1.0 offers a blueprint for integrating security features directly into microprocessors.
Cyberattacks on logistics are becoming increasingly common, and the potential impact is enormous.
Attacks by a previously unknown threat actor leveraged two bugs in firewall devices to install custom backdoors on several government networks globally.
How the CISO of Kenvue, a consumer healthcare company spun out from Johnson & Johnson, combined tools and new ideas to build out the security program.
Get updated advice on how, when, and where we should disclose cybersecurity incidents under the SEC's four-day rule after SolarWinds, and join the call to revamp the rule to remediate first.