Epic Management Provides Notice of Data Security Incident
December 15 2022Microsoft-Signed Malicious Drivers Usher In EDR-Killers, Ransomware
December 15 2022Malicious Windows drivers signed as legit by Microsoft have been spotted as part of a toolkit used to kill off security processes in post-exploitation cyber activity.
Read moreCSAF Is the Future of Vulnerability Management
December 15 2022Version 2.0 of the Common Security Advisory Framework will enable organizations to automate vulnerability remediation.
Read moreApple Zero-Day Actively Exploited on iPhone 15
December 15 2022Without many details, Apple patches a vulnerability that has been exploited in the wild to execute code.
Read moreProofpoint Nabs Illusive, Signaling a Sunset for Deception Tech
December 14 2022Former pure-play deception startup Illusive attracts Proofpoint with its repositioned platform focusing on identity threat detection and response (ITDR).
Read moreThe proliferation of automated cyberattacks against npm, NuGet, and PyPI underscores the growing sophistication of threat actors and the threats to open source software supply chains.
Read moreLearn to think three moves ahead of hackers so you're playing chess, not checkers. Instead of reacting to opponents' moves, be strategic, and disrupt expected patterns of vulnerability.
Read moreRoyal Ransomware Puts Novel Spin on Encryption Tactics
December 14 2022An emerging cybercriminal group linked with Conti has expanded its partial encryption strategy and demonstrates other evasive maneuvers, as it takes aim at healthcare and other sectors.
Read more
Recent Comments