Source
DARKReading
For the first time in a year, security incidents involving email compromises surpassed ransomware incidents, a new analysis shows.
System of Trust includes data-driven metrics for evaluating the integrity of software, services, and suppliers.
Last month attackers quickly reverse-engineered VMware patches to launch RCE attacks. CISA warns it's going to happen again.
From a scrappy contest where hackers tried to win laptops, Pwn2Own has grown into a premier event that has helped normalize bug hunting.
Polygraph Data Platform adds Kubernetes audit log monitoring, integration with Kubernetes admission controller, and Infrastructure as Code (IaC) security to help seamlessly integrate security into developer workflows.
Publicly released proof-of-concept exploits are supercharging attacks against unpatched systems, CISA warns.
Build security in up front to secure open source code at the foundational level. Apply security controls, have engineering teams test, do code review, and use attacker-centric behavioral analytics to mitigate threats.
Attackers appear to have found a way around PowerShell monitoring by using a default utility instead.
It has never been more important for organizations of all sizes to prioritize securing their users and their infrastructure secrets with zero-trust network access.
As demonstrated in Ukraine and elsewhere, the battlefield for today's warriors extends to the virtual realm with cyber warfare.