Security
Headlines
HeadlinesLatestCVEs

Source

DARKReading

Fake Accounts Are Not Your Friends!

Inflated user bases and fake engagement cause more harm than good, especially when the artificial accounts are based on stolen human identities.

DARKReading
#vulnerability#web#git#intel
Plug Your Data Leaks: Integrating Data Loss Prevention into Your Security Stack

The average cost of a data-exposing cybersecurity incident is $4.35 million. If your business can’t avoid to pay, make sure you’ve got a strong data loss prevention practice in place.

Google Quashes 5 High-Severity Bugs With Chrome 106 Update

External researchers contributed 16 of the 20 security updates included in the new Chrome 106 Stable Channel rollout, including five high-severity bugs.

Sophisticated Covert Cyberattack Campaign Targets Military Contractors

Malware used in the STEEP#MAVERICK campaign features rarely seen obfuscation, anti-analysis, and evasion capabilities.

Fast Company CMS Hack Raises Security Questions

The company's website remains offline after hackers used its compromised CMS to send out racist messages.

Container Supply Chain Attacks Cash In on Cryptojacking

Cloud-native threats are costing cloud customer victims money as cryptojackers mine their vulnerable cloud instances.

Google Cloud DORA: Securing the Supply Chain Begins With Culture

The team's annual survey finds that the right development culture is better than technical measures when it comes to shoring up software supply chain security practices. An additional benefit: Less burnout.

Phishing Attacks Crushed Records Last Quarter, Driven by Mobile

Shocking phishing numbers (more than 1 million in a single quarter) are being driven by vishing, smishing, and other lures that target mobile devices.

The Countdown to DORA

With provisional agreement reached on the Digital Operational Resilience Act, the clock is now ticking for banks and information and communications technology (ICT) services companies with European operations. Here's what you need to know.

Chaos Malware Resurfaces With All-New DDoS & Cryptomining Modules

The previously identified ransomware builder has veered in an entirely new direction, targeting consumers and business of all sizes by exploiting known CVEs through brute-forced and/or stolen SSH keys.