Security
Headlines
HeadlinesLatestCVEs

Source

DARKReading

Snyk Agrees to Acquire CloudSkiff, Creators of driftctl

New capabilities allow Snyk Infrastructure as Code customers to more effectively detect infrastructure drift.

DARKReading
APTs, Teleworking, and Advanced VPN Exploits: The Perfect Storm

A Mandiant researcher shares the details of an investigation into the misuse of Pulse Secure VPN devices by suspected state-sponsored threat actors.

Russian National Accused of Role in Trickbot Is Extradited to US

Court documents say Vladimir Dunaev is alleged to have been a malware developer for the Trickbot Group.

Cybercriminals Take Aim at Connected Car Infrastructure

While car makers are paying more attention to cybersecurity, the evolution of automobiles into "software platforms on wheels" and the quick adoption of new features has put connected cars in the crosshairs.

What Exactly Is Secure Access Service Edge (SASE)?

Any company that supports a hybrid workforce should at least be familiar with this relatively new security approach.

A Treehouse of Security Horrors

True-life horrors from conversations with software engineers and developers. D'oh!

Finding the Right Approach to Cloud Security Posture Management (CSPM)

Cloud security is maturing — it has to. New strategies are surfacing to respond to new problems. Dr. Mike Lloyd, RedSeal's CTO, reviews one of the latest: CSPM.

6 Ways to Rewrite the Impossible Job Description

It's hard enough to fill a cybersecurity position given the talent shortage. But you may be making it harder with a poor job description that turns off would-be candidates.

SEO Poisoning Used to Distribute Ransomware

This tactic — used to distribute REvil ransomware and the SolarMarker backdoor — is part of a broader increase in such attacks in recent months, researchers say.

Top Hardware Weaknesses List Debuts

CWE list aimed at designers and programmers to avoid key hardware weaknesses early in product development.