The TeamTNT threat actor appears to be setting the stage for broader cloud worm attacks, researchers say.
Read moreOnly a quarter of hospitals have implemented the strongest level of DMARC, with a third running any version of the email validation protocol.
Read moreArtificial intelligence can be tricked into making password-based authentication even weaker.
Read moreWhy CFOs & CISOs Must Collaborate to Strengthen and Protect Organizations in a Recession
July 17 2023Cyber threats are intensifying even as budgets are being scrutinized. Now, more than ever, security and finance professionals need to align on cybersecurity strategies.
Read moreInsider Risk Management Starts With SaaS Security
July 17 2023SaaS security posture management helps mitigate common threats posed by malicious or negligent insiders.
Read moreHow Hackers Can Hijack a Satellite
July 15 2023We rely on them for communications, military activity, and everyday tasks. How long before attackers really start to look up at the stars?
Read moreSBOMs Still More Mandate Than Security
July 15 2023A software bills of materials standard gets an update, but while half of firms require the manifests, the driver is compliance rather than security.
Read moreCisco Flags Critical SD-WAN Vulnerability
July 15 2023A flaw in the REST API of Cisco's SD_WAN vManage software could allow remote, unauthenticated attackers to perform data exfiltration.
Read moreRogue Azure AD Guests Can Steal Data via Power Apps
July 15 2023A few default guest setting manipulations in Azure AD and over-promiscuous low-code app developer connections can upend data protections.
Read more
Recent Comments