Security
Headlines
HeadlinesLatestCVEs

Source

DARKReading

What You Need for a Strong Security Posture

From the basics to advanced techniques, here's what you should know.

DARKReading
#vulnerability#web#linux#intel#aws#alibaba
Cyberattackers Spoof Google Translate in Unique Phishing Tactic

The campaign uses a combination of tactics and a common JavaScript obfuscation technique to fool both end users and email security scanners to steal credentials.

State of Security Data Management 2022 Report Reveals Overconfidence Masks a Pervasive Data Problem

Despite dozens of tools and external vendors, 2 in 3 organizations believe their data strategy isn't sustainable beyond three years, which could leave businesses vulnerable.

Attackers Use Automation to Speed from Exploit to Compromise According to Lacework Labs Cloud Threat Report

New open source Cloud Hunter tool, developed through Lacework Labs research, helps customers get better visibility to reduce response times for incident investigations.

What the Uber Breach Verdict Means for CISOs in the US

Can already beleaguered CISOs now add possible legal charges to their smorgasbord of job considerations? Disclose a breach to comply and face dismissal, or cover it up and face personal punishment.

Thoma Bravo to Acquire ForgeRock in $2.3B Deal

This marks the third identity and access management (IAM) company acquired by Thoma Bravo in just the past few months.

WhatsApp Users Beware: Dangerous Mobile Trojan Being Distributed via Malicious Mod

Among other things, users who download the app could end up having their WhatsApp account details stolen.

KnowBe4 to Be Acquired for $4.6B by Private Equity Firm Vista

Vista Equity Partners plans take the publicly traded security-awareness training vendor private.

Airborne Drones Are Dropping Cyber-Spy Exploits in the Wild

Drone-based cyberattacks to spy on corporate targets are no longer hypothetical, one incident from this summer shows.

Key Takeaways From Omdia's IGA Market Radar

Identity governance administration (IGA) started life as a tool for organizations to meet a sudden surge of legal and regulatory requirements, but it has grown into a key enabler of security.