New service from BlackBerry's Threat Research and Intelligence Team reduces unknowns to enhance detection and response.
Read moreTop 10 Kubernetes Security Risks Every DevSecOps Pro Should Know
October 26 2022The mission to run any containerized application on any infrastructure makes security a challenge on Kubernetes.
Read moreBaltimore/Washington International Thurgood Marshall Airport Selects Telos to Process Background Checks for Aviation Workers
October 26 2022Telos' aviation channeling service offers increased efficiency and flexibility in credentialing operations at the busiest airport in the Washington-Baltimore region.
Read moreDark Reading Launches New Section Dedicated to ICS/OT Security
October 26 2022ICS/OT Security joins the lineup of 14 cybersecurity topic sections on the media site.
Read moreAustralia Increases Fines for Massive Data Breaches
October 26 2022After suffering two large, and embarrassing, data breaches in recent weeks, the Australian government increased the fine for serious data breaches from $2.2 million to a minimum of $50...
Read more"We told you to stop but you ignored us," said the French regulator, "so now we're coming after you again."
Read moreA pair of Microsoft bugs allow cyberattackers to bypass native Windows Internet download security, says former CERT CC researcher who discovered the flaws.
Read moreA pair of Microsoft bugs allow cyberattackers to bypass native Windows Internet download security, says former CERT CC researcher who discovered the flaws.
Read moreLinkedIn Phishing Spoof Bypasses Google Workspace Security
October 25 2022A credential-stealing attack that spoofed LinkedIn and targeted a national travel organization skates past DMARC and other email protections.
Read moreThreat Groups Repurpose Banking Trojans into Backdoors
October 25 2022Ursnif, a one-time banking Trojan also known as Gozi, becomes the latest codebase to be repurposed as a more general backdoor, as malware developers trend toward modularity.
Read more
Recent Comments