The rapid growth of APIs creates a widening attack surface and increasing unknown cybersecurity risks.
Read moreThe rapid growth of APIs creates a widening attack surface and increasing unknown cybersecurity risks.
Read moreA Closer Look at the Snatch Data Ransom Group
October 1 2023Earlier this week, KrebsOnSecurity revealed that the darknet website for the Snatch ransomware group was leaking data about its users and the crime gang's internal operations. Today, we'll take...
Read moreFriday Squid Blogging: Protecting Cephalopods in Medical Research
September 30 2023From Nature:
Cephalopods such as octopuses and squid could soon receive the same legal protection as mice and monkeys do when they are used in research. On 7 September,...
Read more
Securing AI: What You Should Know
September 30 2023Securing AI within your organization starts with understanding how AI differs from traditional business tools. Google's Secure AI Framework provides a model for what to do next.
Read moreHow Can Your Security Team Help Developers Shift Left?
September 30 2023Implementing a shift-left process in cybersecurity requires pulling together people, processes, and technology.
Read moreSpyware Vendor Targets Egyptian Orgs With Rare iOS Exploit Chain
September 30 2023The Israeli company developed highly-targeted, mobile malware that would make any APT jealous.
Read moreDHS: Physical Security a Concern in Johnson Controls Cyberattack
September 30 2023An internal memo cites DHS floor plans that could have been accessed in the breach.
Read moreCybersecurity Gaps Plague US State Department, GAO Report Warns
September 30 2023The federal department that oversees the US diplomatic corps abroad suffers a serious lack of visibility into the cyber threats it faces and the security vulnerabilities it's harboring.
Read moreMove Over, MOVEit: Critical Progress Bug Infests WS_FTP Software
September 30 2023In the wake of Cl0p's MOVEit rampage, Progress Software is sending file-transfer customers scrambling again — this time to patch a critical bug that is easily exploitable with a...
Read more
Recent Comments