Security
Headlines
HeadlinesLatestCVEs

Source

DARKReading

Lazarus Targets Chemical Sector With 'Dream Jobs,' Then Trojans

Chemical companies are the latest to be targeted by the well-known North Korean group, which has targeted financial firms, security researchers, and technology companies in the past.

DARKReading
#vulnerability#web#mac#apple#google#oracle#intel#auth
CISA Alert on ICS, SCADA Devices Highlights Growing Enterprise IoT Security Risks

Omdia Senior Analyst Hollie Hennessy says the new threat to multiple ICS and SCADA devices underscores the importance of a rapid response to IoT and OT security risks.

Cybersecurity Act of 2022: A Step in the Right Direction With a Significant Loophole

The act contains a loophole added late in the process that will impede progress toward the goal of increasing US cybersecurity: a complete carve-out of DNS from the reporting requirements and other obligations outlined in the bill.

greymatter.io Closes $7.1 Million Series A to Meet Rising Need for Its Enterprise Microservices Platform

Elsewhere Partners invests in proven service mesh and API management innovator as it grows team and breaks into new markets.

New Malware Tools Pose 'Clear and Present Threat' to ICS Environments

The recent discovery of highly customized malware targeting programmable logic controllers has renewed concerns about the vulnerability of critical infrastructure.

Data Scientists, Watch Out: Attackers Have Your Number

Researchers should take extra care in deploying data-science applications to the cloud, as cybercriminals are already targeting popular data-science tools such as Jupyter Notebook.

Inside a Data Center Outage: Lessons About Resilience

A power failure at a major London data center shows that a truly resilient network is flexible, not just redundant.

The Misconceptions of 2021's Black Swan Cyber Events

Organizations can defend themselves from future unknows attacks by implementing targeted security hardening measures, turning on built-in security protections, and leveraging existing technology stack to achieve microsegmentation and credential hygiene.

Third-Party Software Risks Grow, but So Do Solutions: Third-Party Software Risks Grow, but So Do Solutions

Enterprises are more dependent than ever on open source software and need to manage the risk posed by vulnerabilities in components and third-party vendors.