After the Raccoon Stealer Trojan disappeared, the RIG Exploit Kit seamlessly adopted Dridex for credential theft.
Read moreExperts tell teams to prepare for more regulation, platform consolidation, management scrutiny, and attackers with the ability to claim human casualties.
Read moreOpen source is here to stay, and it's imperative that CIOs have a mature, open source engagement strategy, across consumption, contribution, and funding as a pillar of digital transformation.
Read moreIt took three years, but the Capital One cracker was convicted in the end. Don't get caught out in a data breach of your own!
Read moreWhile there's an immediate need to improve MFA adoption, it's also critical to move to more advanced and secure passwordless frameworks, including biometrics. (Part 1 of 2)
Read moreBRATA Android Malware Evolves Into an APT
June 21 2022The BRATA Android banking Trojan is evolving into a persistent threat with a new phishing technique and event-logging capabilities.
Read moreReducing Risk With Zero Trust
June 21 2022Zero trust isn’t just about authentication. Organizations can combine identity data with business awareness to address issues such as insider threat.
Read moreDeep-dive study unearthed security flaws that could allow remote code execution, file manipulation, and malicious firmware uploads, among other badness.
Read moreAI Is Not a Security Silver Bullet
June 21 2022AI can help companies more effectively identify and respond to threats, as well as harden applications.
Read moreOpen Source Software Security Begins to Mature
June 21 2022Only about half of firms have an open source software security policy in place to guide developers in the use of components and frameworks, but those that do exhibit...
Read more
Recent Comments