Security
Headlines
HeadlinesLatestCVEs

Source

DARKReading

Magecart: How Its Attack Techniques Evolved

Shape-shifting Magecart has shown itself to be highly adaptable in its ability to compromise third-party websites, especially during the pandemic.

DARKReading
Security Fears & Remote Work Drive Continued 2FA Adoption

Seventy-nine percent of people used two-factor authentication at least once in 2021, with 72% regularly using the technology, as remote work, social media, and online retail spur demand.

Brute-Force Attacks, Vulnerability Exploits Top Initial Attack Vectors

A new analysis emphasizes how most security incidents can be avoided with strong patch management and password management policies.

More Than 10,000 Cybersecurity Professionals Have Earned the (ISC)2 CCSP Cloud Security Certification

CCSP certification validates comprehensive vendor-neutral cloud security expertise, as demand for proven talent for protecting data and cloud infrastructure intensifies.

Executives' Ransomware Concerns Are High, but Few Are Prepared for Such Attacks

The vast majority (86.7%) of C-suite and other executives say they expect the number of cyberattacks targeting their organizations to increase over the next 12 months, according to a recent Deloitte poll.

Apple Patches Zero-Days in iOS 14.8 Update

An important security update addresses vulnerabilities in CoreGraphics and WebKit that may have been actively exploited.

Constructive Complaints: 5 Ways to Transform Problems Into Plans

Working in infosec has its challenges, and it's easy enough to complain about them. But that won't solve anything.

Booz Allen Hamilton Acquires Digital Forensics Firm Tracepoint

The company's technology will integrate with Booz Allen's commercial cyber business.

Kiersten Todt Named Chief of Staff for CISA

Over the past four years, Todt has led CRI from conception to one of the leading global cybersecurity resources available to small and medium-sized enterprises (SMEs).

4 Steps for Fostering Collaboration Between IT Network and Security Teams

Successful collaboration requires a four-pronged approach that considers operations and infrastructure, leverages shared data, supports new workflows, and is formalized with documentation.