A new report helps companies understand an ever-changing threat landscape and how to strengthen their defenses against emerging cybersecurity trends.
Read moreIranian APT Targets US With Drokbk Spyware via GitHub
December 9 2022The custom malware used by the state-backed Iranian threat group Drokbk has so far flown under the radar by using GitHub as a "dead-drop resolver" to more easily evade...
Read moreHow Naming Can Change the Game in Software Supply Chain Security
December 9 2022A reliance on CPE names currently makes accurate searching for high-risk security vulnerabilities difficult.
Read moreGoogle: Use SLSA Framework for Better Software Security
December 9 2022Security leaders also need to take a more holistic approach to addressing supply chain risks, company says in new research report.
Read more3 Ways Attackers Bypass Cloud Security
December 9 2022At Black Hat Europe, a security researcher details the main evasion techniques attackers are currently using in the cloud.
Read moreCNAPP Shines a Light Into Evolving Cloud Environments
December 9 2022Cloud-native application protection platform (CNAPP) addresses security challenges in multicloud environments, including integrating applications across multicloud or hybrid cloud environments.
Read moreAgrius Iranian APT Group Cuts Into Diamond Industry
December 9 2022The supply chain attack is piggybacking off an earlier breach to deploy new wiper malware.
Read moreTo be most effective, protective DNS services need to constantly reassess and rescore domains as additional data comes in.
Read moreSingle Sign-on: It’s Only as Good as Your Ability to Use It
December 9 2022Increased federal cybersecurity regulations provide a pivot point for manufacturers to reconsider their access management strategy.
Read more
Recent Comments