Security
Headlines
HeadlinesLatestCVEs

Source

DARKReading

Sidewalk Malware Tied to China-Linked Espionage Group

The Sidewalk backdoor has been connected to the Grayfly espionage group and seen in attacks in Asia and North America.

DARKReading
Researchers Play Leading Role in Detecting Cloud Misconfiguration

A new report finds 62% of cloud misconfiguration incidents are reported by independent researchers before criminals can find them.

How to Bust Through Barriers for a More Diverse Cybersecurity Workforce

Diversity is the topic du jour, but cybersecurity professionals of color still face a lot of hurdles to enter and grow within the industry. Organizations such as Blacks in Cybersecurity are providing some of these under-represented groups with a voice.

First Initiatives for the First National Cyber Director

The US appointed Chris Inglis as the first National Cyber Director (NCD). Here are three key problems he must now address.

33% of Reported Phishing Emails Prove Malicious or Suspect

A new analysis from F-Secure details commonly used phishing phrases and methods seen in attacks.

In the Hybrid Future, Secure Everything Like You're Never Going Back

Security practices must change to reflect the reality that remote/hybrid work is the new norm. Here are three risk mitigation measures for a remote-first world.

FireMon Acquires DisruptOps, Gains Cloud Security Operations Capabilities

The acquisition will help FireMon deliver capabilities for detecting security threats to enterprise data in public cloud infrastructure, CEO Jody Brazil says.

Edge Chat with Cisco Secure's TK Keanini on Achieving Better Security Outcomes

The latest installment of Edge Chats focuses on how security teams can achieve better security outcomes with an open platform.

Attackers Moving Faster Inside Target Networks

Criminals begin moving laterally inside a target network within 92 minutes of gaining access and demonstrate new stealthy capabilities, a new report shows.

FragAttacks Foil 2 Decades of Wireless Security

Wireless security protocols have improved, but product vendors continue to make implementation errors that allow a variety of attacks.