Recent attacks involving so-called "right-to-left override" spoofing aimed at Microsoft 365 users show how attackers sometimes modify and improve old methods to try and stay one step ahead of...
Read moreCompanies are scanning more applications for vulnerabilities — and more often.
Read moreWith its benefits of deniability, relatively low costs, and the ability to attack from anywhere, cyber terrorism will increasingly threaten civilians everywhere.
Read moreAmy Zegart on Spycraft in the Internet Age
February 8 2022Amy Zegart has a new book: Spies, Lies, and Algorithms: The History and Future of American Intelligence. Wired has an excerpt:
In short, data volume and accessibility are...
Read more
It's been a long time coming, and we're not there yet, but at least Microsoft Office will be a bit safer against macro malware...
Read moreQualys Launches Context XDR
February 8 2022Qualys Context XDR provides the security context that operations teams need to eliminate false positives and noise by triangulating risk posture, asset criticality, and threat intelligence.
Read moreInterVision Unveils Ransomware Protection as a Service
February 8 2022InterVision RPaaS solution provides protection, response, and recovery in one managed service.
Read moreSalesforce DevOps Needs Guardrails
February 8 2022Some companies go too fast when it comes to SaaS, DevOps, and security, but smart developers and implementers will respect some basic guidelines to keep their product safe.
Read moreDeepSurface Security Secures $4.5M for Business Expansion
February 8 2022Funding round was led by Differential Ventures, an artificial intelligence and cybersecurity seed venture fund.
Read morePrioritizing the Right Vulnerabilities to Reduce Risk
February 8 2022Prioritization needs to be part of vulnerability management if security teams are to keep up and mitigate issues in a timely manner.
Read more
Recent Comments