Security
Headlines
HeadlinesLatestCVEs

Source

DARKReading

Okta Launches New Workforce Identity Cloud

Okta Worforce Identity Cloud has all three identity functions – identity access management, identity governance, and privilege access management – under the hood.

DARKReading
#web#auth
Cyberwar and Cybercrime Go Hand in Hand

The line between criminal and political aims has become blurred, but motivations matter less than the effects of a breach.

5 Easy Steps to Bypass Google Pixel Lock Screens

PIN-locked SIM card? No problem. It's easy for an attacker to bypass the Google Pixel lock screen on unpatched devices.

Veterans Day Salute: 6 Reasons Why You Want Vets in Your Cyber Platoon

We commend vets in cyber, with this slideshow look at how the training and experience of former military personnel can be a big, differentiating asset in cybersecurity environments.

Twitter's CISO Takes Off, Leaving Security an Open Question

Lea Kissner was one of three senior executives to quit this week, leaving many to wonder if the social media giant is ripe for a breach and FTC action.

LockBit Bigwig Arrested for Ransomware Crimes

A dual Russian-Canadian citizen is being extradited to the US to face charges related to LockBit ransomware activities.

Managing and Mitigating Risk From Unknown Unknowns

Five practical steps to up-level attack surface management programs and gain greater visibility and risk mitigation around the extended ecosystem.

Evasive KmsdBot Cryptominer/DDoS Bot Targets Gaming, Enterprises

KmsdBot takes advantage of SSH connections with weak login credentials to mine currency and deplete network resources, as it gains a foothold on enterprise systems.

Amazon, Microsoft Cloud Leaks Highlight Lingering Misconfiguration Issues

Cloud storage databases, often deployed as "rogue servers" without the blessing of the IT department, continue to put companies and their sensitive data at risk.

How to Close Kubernetes' Network Security Gap

StackRox bridges network security and other gaps and makes applying and managing network isolation and access controls easier while extending Kubernetes' automation and scalability benefit.