The data shows how most cyberattacks start, so basic steps can help organizations avoid becoming the latest statistic.
Read moreKeep Your Friends Close and Your Identity Closer
May 19 2023As we share an increasing amount of personal information online, we create more opportunities for threat actors to steal our identities.
Read moreNew rules aim to level up the quality of submissions to Google and Android device Vulnerability Reward Program.
Read moreSecurity Risks of New .zip and .mov Domains
May 19 2023Researchers are worried about Google’s .zip and .mov domains, because they are confusing. Mistaking a URL for a filename could be a security vulnerability.
Read more85% of AppSec pros say ability to differentiate between real risks and noise is critical, yet only 38% can do so today; mature DevOps organizations cite widespread impact due...
Read moreAll Apple users have zero-days that need patching, though some have more zero-days than others.
Read moreAs enterprises adopt multicloud, the security picture has gotten foggy. Cloud workload protection platforms and distributed firewalls are creating clarity.
Read moreKeePass Vulnerability Imperils Master Passwords
May 19 2023A newly discovered bug in the open source password manager, if exploited, lets attackers retrieve a target's master password — and proof-of-concept code is available.
Read morePlug X and other information-stealing remote-access Trojans are among the malware targeting networking, manufacturing, and logistics companies in Taiwan.
Read more10 Types of AI Attacks CISOs Should Track
May 19 2023Risk from artificial intelligence vectors presents a growing concern among security professionals in 2023.
Read more
Recent Comments