Security
Headlines
HeadlinesLatestCVEs

Source

DARKReading

Prepping the Front Line for MFA Social Engineering Attacks

Attackers will continue to evolve, and the help desk will always be a target. But with the right mix of training, support, and trust, frontline agents can become your biggest security assets.

DARKReading
Tailing Hackers, Columbia University Uses Logging to Improve Security

Logging netflows provided valuable insight about attacker tactics during a breach by state-sponsored hackers targeting Columbia's research labs.

DARPA: Closing the Open Source Security Gap With AI

DARPA's Kathleen Fisher discusses the AI Cyber Challenge at DEF CON 33, and the results that proved how automation can help patch vulnerabilities at scale.

#vulnerability
Hacktivist Tied to Multiple Cyber Groups Sentenced to Jail

At one point, Al-Tahery Al-Mashriky was hacking thousands of websites within the span of three months while stealing personal data and sensitive information.

DPRK, China Suspected in South Korean Embassy Attacks

Detailed spear-phishing emails sent to European government entities in Seoul are being tied to North Korea, China, or both.

Microsoft Lays Out its Quantum-Safe Plans

The goal of the Quantum-Safe Program is to ensure that by 2033, all Microsoft products and services are safe by default from quantum-based attacks.

Fake Employees Pose Real Security Risks

The dangers are particularly severe when they secure IT positions with privileged access and administrative permissions.

Critical SAP Vulns Under Exploitation in 'One-Two Punch' Attack

The vulnerabilities themselves aren't new, but are being exploited in a novel manner that could lead to a "devastating attack."

How Warlock Ransomware Targets Vulnerable SharePoint Servers

Researchers highlight how Warlock, a new ransomware heavyweight, uses its sophisticated capabilities to target on-premises SharePoint instances.

Cybercriminals Abuse Vibe Coding Service to Create Malicious Sites

Some LLM-created scripts and emails can lower the barrier of entry for low-skill attackers, who can use services like Lovable to create convincing, effective websites in minutes.