A technique, dubbed the "Near-Ultrasound Inaudible Trojan" (NUIT), allows an attacker to exploit smartphones and smart speakers over the Internet, using sounds undetectable by humans.
Read moreIoT risk and security must get more attention from vendors and support from the marketplace.
Read moreHow CISOs Can Reduce the Danger of Using Data Brokers
March 28 2023Without proof that it was collected legally, purchased data can threaten an enterprise's security compliance and may expose the company to litigation.
Read moreCISA Releases Hunt Tool for Microsoft’s Cloud Services
March 28 2023CISA released the hunt and response tool to help defenders extract cloud artifacts without performing additional analytics.
Read moreAfter several weeks and more than 130 ransomware victims, GoAnywhere parent company Forta issues a statement.
Read moreIndicators point to Twitter's source code being publicly available for around 3 months, offering a developer security object lesson for businesses.
Read moreFrom rising stars to veterans heading up research teams, check out our profiles of women making a big impact in cyber defense as the threat landscape expands.
Read moreDrive to Pervasive Encryption Boosts Key Management
March 28 2023Key vaults, aka key management as a service (KMaaS), promise to allow companies to encrypt sensitive data across cloud and third parties with granular control.
Read moreDon't assume stakeholders outside security understand your goals and priorities, but consider how you'll communicate with them to gain their support.
Read more
Recent Comments