Security
Headlines
HeadlinesLatestCVEs

Source

DARKReading

15M+ Services & Apps Remain Sitting Ducks for Known Exploits

Scans of the Internet find that millions of computers, virtual machines, and containers are vulnerable to one or more of the hundreds of cyberattacks currently used in the wild, despite being patchable.

DARKReading
#vulnerability#web#mac#windows#apache#java#intel#rce#ibm
What RASP Should Have Been

When runtime application self-protection is held to a higher standard, it can secure thousands of applications and prevent burnout in security teams.

How Strategic Investors Can Help Cybersecurity Startups

Cybersecurity startups face pressure during this economic uncertainty, but strategic investors can help them succeed in providing tech that defends against cyberattacks.

Designing Tabletop Exercises That Actually Thwart Attacks

Have you ever wondered how they design blue team exercises? One ransomware and cyber extortion simulation demonstrates the best practices.

'Proxyjacking' Cybercriminals Exploit Log4j in Emerging, Lucrative Cloud Attacks

Proxyjacking is an emerging, low-effort and high-reward attack for threat actors, with the potential for far-reaching implications.

DoJ Recovers $112M in Crypto Stolen With Romance Scams

Authorities claw back funds from six crypto accounts they say were linked to a "pig-butchering" cybercrime ring.

3CX Breach Widens as Cyberattackers Drop Second-Stage Backdoor

"Gopuram" is a backdoor that North Korea's Lazarus Group has used in some campaigns dating back to 2020, some researchers say.

For Cybercrime Gangs, Professionalization Comes With 'Corporate' Headaches

They rake in millions, but now, as much as zero-days and ransoms, cybercriminals are dealing with management structures and overhead.

Data Breach Strikes Western Digital

The company behind digital storage brand SanDisk says its systems were compromised on March 26.

How Good Is Your Advanced Threat Management?

Whether protecting a financial institution or a hospital, everyone needs an effective strategy for fending off slippery threats like those that hide in memory.