Security
Headlines
HeadlinesLatestCVEs

Source

DARKReading

Taking the Danger Out of IT/OT Convergence

The Colonial Pipeline attack highlighted the risks of convergence. Unified security provides a safer way to proceed.

DARKReading
#vulnerability#mac#windows#git#intel#samba
Microsoft Unveils Dev Box, a Workstation-as-a-Service

Microsoft Dev Box will make it easier for developers and hybrid teams to get up and running with workstations already preconfigured with required applications and tools.

Broadcom Snaps Up VMware in $61B Deal

Massive merger will put Broadcom's Symantec and VMware's Carbon Black under one roof.

Lacework Announces Layoffs, Restructuring

The cloud-security company blames "seismic" market shifts for shakeup.

Third-Party Scripts on Websites Present a 'Broad & Open' Attack Vector

Nearly half of the world's largest websites use externally generated JavaScript that makes them ripe targets for cyberattackers interested in stealing data, skimming credit cards, and executing other malicious actions.

Twitter Fined $150M for Security Data Misuse

Twitter is charged with using emails and phone numbers ostensibly collected for account security to sell targeted ads.

The FDA's New Cybersecurity Guidance for Medical Devices Reminds Us That Safety & Security Go Hand in Hand

The new draft guidance on premarket submissions incorporates quality system regulations and doubles down on a life-cycle approach to product security.

VMware, Airline Targeted as Ransomware Chaos Reigns

Global ransomware incidents target everything from enterprise servers to grounding an airline, with one India-based group even taking a Robin Hood approach to extortion with the "GoodWill" strain.

Big Cyber Hits on GM, Chicago Public Schools, & Zola Showcase the Password Problem

Credential-stuffing attacks against online accounts are still popular, and they work thanks to continuing password reuse.

Act Now: Leveraging PCI Compliance to Improve Security

Let the threat landscape guide your company's timeline for complying with new data security standards for credit cards. Use the phase-in time to improve security overall — security as a process — not just comply with new standards.