For the first time in a year, security incidents involving email compromises surpassed ransomware incidents, a new analysis shows.
Read moreWebsites that Collect Your Data as You Type
May 19 2022A surprising number of websites include JavaScript keyloggers that collect everything you type as you type it, not just when you submit a form.
Researchers from KU Leuven, Radboud...
Read more
System of Trust includes data-driven metrics for evaluating the integrity of software, services, and suppliers.
Read moreLast month attackers quickly reverse-engineered VMWare patches to launch RCE attacks. CISA warns it's going to happen again.
Read moreHow Pwn2Own Made Bug Hunting a Real Sport
May 18 2022From a scrappy contest where hackers tried to win laptops, Pwn2Own has grown into a premier event that has helped normalize bug hunting.
Read moreLacework Integrates Kubernetes Features to Enhance Security Across Multi-Cloud Environments
May 18 2022Polygraph Data Platform adds Kubernetes audit log monitoring, integration with Kubernetes admission controller, and Infrastructure as Code (IaC) security to help seamlessly integrate security into developer workflows.
Read morePublicly released proof-of-concept exploits are supercharging attacks against unpatched systems, CISA warns.
Read moreBuild security in up front to secure open source code at the foundational level. Apply security controls, have engineering teams test, do code review, and use attacker-centric behavioral analytics...
Read moreSome of more tech-savvy Democrats in the U.S. Senate are asking the Federal Trade Commission (FTC) to investigate identity-proofing company ID.me for "deceptive statements" the company and its founder...
Read moreAttackers appear to have found a way around PowerShell monitoring by using a default utility instead.
Read more
Recent Comments