Security
Headlines
HeadlinesLatestCVEs

Tag

#acer

Chat Cybersecurity: AI Promises a Lot, But Can It Deliver?

Machine learning offers great opportunities, but it still can't replace human experts.

DARKReading
#vulnerability#mac#intel#perl#acer
Hunting Insider Threats on the Dark Web

Use threat intelligence to reduce chance of success for malicious insider and Dark Web threats.

A week in security (January 16—22)

Categories: News Tags: Google Tags: Rust Tags: Chromium Tags: Mailchimp Tags: SweepWizard Tags: bossware Tags: TikTok Tags: surveillance firm Tags: Voyager Labs Tags: TracketPacer Tags: Facebook Tags: Instagram Tags: Vice Society Tags: Liquor Control Board of Ontario Tags: Zoho ManageEngine Tags: GitHub Tags: LastPass Tags: Git flaw Tags: ransomware Tags: credit card fraud The most interesting security related news from the week of January 16-22. (Read more...) The post A week in security (January 16—22) appeared first on Malwarebytes Labs.

Fighting technology's gender gap with TracketPacer: Lock and Code S04E02

Categories: Podcast This week on Lock and Code, we speak with Lexie Cooper, the owner behind the TikTok account TrackerPacer, about the vitriol she faced online after talking about the gender gap in technology. (Read more...) The post Fighting technology's gender gap with TracketPacer: Lock and Code S04E02 appeared first on Malwarebytes Labs.

Catchpoint Announces Solution to Monitor and Protect Companies From BGP Incidents

Catchpoint’s Internet Performance Monitoring Platform helps IT teams identify and mitigate BGP incidents, including hijack attempts and routing issues, with the industry’s broadest network of vantage points in the world drawing on real-time BGP monitoring.

Governance in the Cloud Shifts Left

CISOs' top cloud challenge is harmonizing standards, policies, and procedures across blended environments.

The Resolution Every CSO/CISO Should Make This Year

Shift your mindset from risk to resilience.

Don't Be Blindsided by Software Bills of Materials

It's imperative we collaborate and partner to improve software security. This may require developing tools and standards that can enrich SBOMs and provide deeper analysis.

Five Guys Data Breach Puts HR Data Under a Heat Lamp

Job applicants could face a raft of follow-on attacks after cyber intruders accessed their data in an opportunistic attack.

Linux PT_SUSPEND_SECCOMP Permission Bypass / Ptracer Death Race

Linux suffers from two seccomp bugs with a PT_SUSPEND_SECCOMP permission bypass and ptracer death race condition.