Security
Headlines
HeadlinesLatestCVEs

Source

DARKReading

Fighting Follina: Application Vulnerabilities and Detection Possibilities

Although organizations should perform proper risk analysis and patch as soon as practical after there's a fix for this vulnerability, defenders still have options before that's released.

DARKReading
#vulnerability#web#mac#windows#microsoft#intel#rce#perl#zero_day
Neutralizing Novel Trickbot Attacks With AI

Artificial intelligence technology can detect the latest wave of Trickbot ransomware and block the attack before it causes damage.

Darktrace's Brianna Leddy on How Ransomware Groups Adapt to New Defenses

In this Tech Talk, Darktrace's Brianna Leddy and Dark Reading's Terry Sweeney discuss ways ransomware groups adapt their activities as enterprise security teams evolve their defenses and controls.

Managing Extended Software Supply Chain Risks

Supply chain woes have dominated headlines, but there's another type of supply chain that's also increasingly at risk: the cloud supply chain.

Hunting for Threats Using Network Traffic Flows

SeclarityIO's NetworkSage platform analyzes network traffic data to identify attacks before they become real problems.

FluBot Android Malware Operation Disrupted, Infrastructure Seized

Security researchers have described the malware as among the fastest-spreading mobile threats in recent years.

NetSPI's New Breach and Attack Simulation Enhancements Help Organizations Achieve Behavior-Based Threat Detection

Organizations leverage the platform-driven, human-delivered service to measure and continuously improve the efficacy of detective controls and MSSP coverage.

Netenrich Debuts Resolution Intelligence Secure Digital Operations Platform at RSA 2022

New operational analytics and AI/ML platform drives contextual intelligence and prioritized actions to anticipate risky behaviors, disrupt threats and insure business resilience.

12K Misconfigured Elasticsearch Buckets Ravaged by Extortionists

The cloud instances were left open to the public Internet with no authentication, allowing attackers to wipe the data.

Darktrace's David Masson on What Attacks on Critical Infrastructure Look Like

In this Tech Talk, Darktrace's David Masson and Dark Reading's Terry Sweeney discuss the rise of destructive attacks against critical infrastructure.