Security
Headlines
HeadlinesLatestCVEs

Source

DARKReading

Data Siloes: Overcoming the Greatest Challenge in SecOps

It's not lack of data that's the problem, but the inability to piece it together to truly understand and reduce risk.

DARKReading
#vulnerability#mac#git#intel
3 Common Initial Attack Vectors Account for Most Ransomware Campaigns

The data shows how most cyberattacks start, so basic steps can help organizations avoid becoming the latest statistic.

Keep Your Friends Close and Your Identity Closer

As we share an increasing amount of personal information online, we create more opportunities for threat actors to steal our identities.

Google Debuts Quality Ratings for Security Bug Disclosures

New rules aim to level up the quality of submissions to Google and Android device Vulnerability Reward Program.

AppSec Teams Stuck in Catch-Up Cycle Due to Massive Cloud-Native Enablement Gap

85% of AppSec pros say ability to differentiate between real risks and noise is critical, yet only 38% can do so today; mature DevOps organizations cite widespread impact due to lack of cloud-native tools

Enterprises Rely on Multicloud Security to Protect Cloud Workloads

As enterprises adopt multicloud, the security picture has become foggy. Cloud workload protection platforms and distributed firewalls are creating clarity.

KeePass Vulnerability Imperils Master Passwords

A newly discovered bug in the open source password manager, if exploited, lets attackers retrieve a target's master password — and proof-of-concept code is available.

Trojan-Rigged Phishing Attacks Pepper China-Taiwan Conflict

Plug X and other information-stealing remote-access Trojans are among the malware targeting networking, manufacturing, and logistics companies in Taiwan.

10 Types of AI Attacks CISOs Should Track

Risk from artificial intelligence vectors presents a growing concern among security professionals in 2023.

Microsoft Azure VMs Hijacked in Cloud Cyberattack

Cybercrime group that often uses smishing for initial access bypassed traditional OS targeting and evasion techniques to directly gain access to the cloud.