This year's finalists tackle such vital security concerns as permissions management, software supply chain vulnerability, and data governance. Winners will be announced June 6.
Read moreBrexit Leak Site Linked to Russian Hackers
May 25 2022Purporting to publish leaked emails of pro-Brexit leadership in the UK, a new site's operations have been traced to Russian cyber-threat actors, Google says.
Read moreImplement zero-trust policies for greater control, use BYOD management tools, and take proactive steps such as keeping apps current and training staff to keep sensitive company data safe and...
Read moreCLOP Ransomware Activity Spiked in April
May 25 2022In just one month, the ransomware group's activity rose by 2,100%, a new report finds.
Read moreYet another adversarial ML attack:
Most deep neural networks are trained by stochastic gradient descent. Now “stochastic” is a fancy Greek word for “random”; it means that the training...
Read more
With manufacturing ranking as the fourth most targeted sector, manufacturers that understand their exposure will be able to build the necessary security maturity.
Read moreA DDoS campaign observed by Akamai from actors claiming to be REvil would represent a major pivot in tactics for the gang.
Read moreDBIR Makes a Case for Passwordless
May 25 2022The 2022 Data Breach Investigations Report repeatedly makes the point that criminals are stealing credentials to carry out their attacks.
Read moreMore supply chain trouble - this time with clear examples so you can learn how to spot this stuff yourself.
Read more‘There’s No Ceiling’: Ransomware’s Alarming Growth Signals a New Era, Verizon DBIR Finds
May 24 2022Ransomware has become so efficient, and the underground economy so professional, that traditional monetization of stolen data may be on its way out.
Read more
Recent Comments