Source
DARKReading
After several weeks and more than 130 ransomware victims, GoAnywhere parent company Forta issues a statement.
Indicators point to Twitter's source code being publicly available for around three months, offering a developer security object lesson for businesses.
From rising stars to veterans heading up research teams, check out our profiles of women making a big impact in cyber defense as the threat landscape expands.
Key vaults, aka key-management-as-a-service (KMaaS), promise to allow companies to encrypt sensitive data across cloud and third parties with granular control.
Don't assume stakeholders outside security understand your goals and priorities, but consider how you'll communicate with them to gain their support.
The joint partnership represents expanded market opportunities.
In two days, ethical researchers from 10 countries have unearthed more than 22 zero-day bugs in a wide range of technologies at the annual hacking contest.
GitHub hastens to replace its RSA SSH host key after an exposure mishap threatens users with man-in-the-middle attacks and organization impersonation.
A new threat actor is racking up victims and showing unusual agility. Part of its success could spring from the use of the Nim programming language.
The second malicious ChatGPT extension for Chrome has been discovered, giving malicious actors access to users' Facebook accounts through stolen cookies.