A complete bypass of the Kyverno security mechanism for container image imports allows cyberattackers to completely take over a Kubernetes pod to steal data and inject malware.
Read moreLastPass finally admits: Those crooks who got in? They did steal your password vaults, after all…
December 24 2022The crooks now know who you are, where you live, which computers are yours, where you go online... and they got those password vaults, too.
Read moreLastPass Cops to Massive Breach Including Customer Vault Data
December 24 2022The follow-on attack from August's source-code breach could fuel future campaigns against LastPass customers.
Read moreVideoconferencing Worries Grow, With SMBs in Cyberattack Crosshairs
December 24 2022Securing videoconferencing solutions is just one of many IT security challenges small businesses are facing, often with limited financial and human resources.
Read moreGoogle: With Cloud Comes APIs & Security Headaches
December 23 2022APIs are key to cloud transformation, but two Google surveys find that cyberattacks targeting them are reaching a tipping point, even as general cloud security issues abound.
Read moreFool Me Thrice? How to Avoid Double and Triple Ransomware Extortion
December 23 2022To stay safer, restrict access to data, monitor for breaches in the supply chain, track relevant data that is sold on the Dark Web, and implement best safety practices....
Read moreHacking the JFK Airport Taxi Dispatch System
December 23 2022Two men have been convicted of hacking the taxi dispatch system at the JFK airport. This enabled them to reorder the taxis on the list; they charged taxi drivers...
Read moreSecurity Is a Second-Class Citizen in High-Performance Computing
December 23 2022Vendors and operators attempt to balance power and security, but right now, power is the highest goal.
Read moreWhat Kind of Data Gets Stolen When a Developer is Compromised?
December 23 2022What is the worst that can happen when a developer's machine is compromised? Depending on the developer's position, attackers gain access to nearly everything: SSH keys, credentials, access to...
Read moreNew Brand of Security Threats Surface in the Cloud
December 23 2022Tech Insight report co-produced by Black Hat, Dark Reading, and Omdia examines how cloud security is evolving in a rapid race to beat threat actors to the (cloud) breach.
Read more
Recent Comments