Source
DARKReading
New capabilities allow Snyk Infrastructure as Code customers to more effectively detect infrastructure drift.
A Mandiant researcher shares the details of an investigation into the misuse of Pulse Secure VPN devices by suspected state-sponsored threat actors.
Court documents say Vladimir Dunaev is alleged to have been a malware developer for the Trickbot Group.
While car makers are paying more attention to cybersecurity, the evolution of automobiles into "software platforms on wheels" and the quick adoption of new features has put connected cars in the crosshairs.
Any company that supports a hybrid workforce should at least be familiar with this relatively new security approach.
True-life horrors from conversations with software engineers and developers. D'oh!
Cloud security is maturing — it has to. New strategies are surfacing to respond to new problems. Dr. Mike Lloyd, RedSeal's CTO, reviews one of the latest: CSPM.
It's hard enough to fill a cybersecurity position given the talent shortage. But you may be making it harder with a poor job description that turns off would-be candidates.
This tactic — used to distribute REvil ransomware and the SolarMarker backdoor — is part of a broader increase in such attacks in recent months, researchers say.
CWE list aimed at designers and programmers to avoid key hardware weaknesses early in product development.