Security
Headlines
HeadlinesLatestCVEs

Source

DARKReading

Rezilion Vulnerability Scanner Benchmark Report Finds Top Scanners Only 73% Accurate

Majority of vulnerability scanner tools overwhelming teams with false positives and missing exploitable vulnerabilities.

DARKReading
#vulnerability#docker
BlackBerry Launches Cyber Threat Intelligence Service to Strengthen Cyber Defenses

New service from BlackBerry's Threat Research and Intelligence Team reduces unknowns to enhance detection and response.

Top 10 Kubernetes Security Risks Every DevSecOps Pro Should Know

The mission to run any containerized application on any infrastructure makes security a challenge on Kubernetes.

Baltimore/Washington International Thurgood Marshall Airport Selects Telos to Process Background Checks for Aviation Workers

Telos' aviation channeling service offers increased efficiency and flexibility in credentialing operations at the busiest airport in the Washington-Baltimore region.

Dark Reading Launches New Section Dedicated to ICS/OT Security

ICS/OT Security joins the lineup of 14 cybersecurity topic sections on the media site.

Windows Mark of the Web Zero-Days Remain Patchless, Under Exploit

A pair of Microsoft bugs allow cyberattackers to bypass native Windows Internet download security, says former CERT CC researcher who discovered the flaws.

LinkedIn Phishing Spoof Bypasses Google Workspace Security

A credential-stealing attack that spoofed LinkedIn and targeted a national travel organization skates past DMARC and other email protections.

Threat Groups Repurpose Banking Trojans into Backdoors

Ursnif, a one-time banking Trojan also known as Gozi, becomes the latest codebase to be repurposed as a more general backdoor, as malware developers trend toward modularity.

HR Departments Play a Key Role in Cybersecurity

A more secure organization starts with stronger alignment between HR and the IT operation.

Equifax's Lessons Are Still Relevant, 5 Years Later

Cybersecurity pros discuss a trio of lessons from the Equifax hack and how to prevent similar attacks in the enterprise.