Security

bg
Ditch the Alert Cannon: Modernizing IDS is a Security Must-Do

Ditch the Alert Cannon: Modernizing IDS is a Security Must-Do

Jeff Costlow, CISO at ExtraHop, makes the case for implementing next-gen intrusion-detection...

bg
Azure Zero-Day Flaws Highlight Lurking Supply-Chain Risk

Azure Zero-Day Flaws Highlight Lurking Supply-Chain Risk

Dubbed OMIGOD, a series of vulnerabilities in the Open Management Infrastructure...

bg
MyRepublic Data Breach Raises Data-Protection Questions

MyRepublic Data Breach Raises Data-Protection Questions

The incident raises considerations for security for critical data housed in third-party...

bg
Financial Cybercrime: Why Cryptocurrency is the Perfect ‘Getaway Car’

Financial Cybercrime: Why Cryptocurrency is the Perfect...

John Hammond, security researcher with Huntress, discusses how financially motivated...

bg
Zoho ManageEngine Password Manager Zero-Day Gets a Fix, Amid Attacks

Zoho ManageEngine Password Manager Zero-Day Gets a Fix,...

An authentication bypass vulnerability in the ManageEngine ADSelfService Plus platform...

bg
‘Azurescape’ Kubernetes Attack Allows Cross-Container Cloud Compromise

‘Azurescape’ Kubernetes Attack Allows Cross-Container Cloud...

A chain of exploits could allow a malicious Azure user to infiltrate other customers'...

bg
Zoho Password Manager Zero-Day Bug Under Active Attack Gets a Fix

Zoho Password Manager Zero-Day Bug Under Active Attack...

An authentication bypass vulnerability leading to remote code execution offers up...

bg
TeamTNT’s New Tools Target Multiple OS

TeamTNT’s New Tools Target Multiple OS

The attackers are indiscriminately striking thousands of victims worldwide with...

bg
The State of Incident Response: Measuring Risk and Evaluating Your Preparedness

The State of Incident Response: Measuring Risk and Evaluating...

Grant Oviatt, director of incident-response engagements at Red Canary, provides...

bg
Google Play Sign-Ins Allow Covert Location-Tracking

Google Play Sign-Ins Allow Covert Location-Tracking

A design flaw involving Google Timeline could allow someone to track another device...

bg
Digital State IDs Start Rollouts Despite Privacy Concerns

Digital State IDs Start Rollouts Despite Privacy Concerns

Eight states are introducing drivers licenses and identification cards available...

bg
Cream Finance DeFi Platform Rooked For $29M

Cream Finance DeFi Platform Rooked For $29M

Cream is latest DeFi platform to get fleeced in rash of attacks.

bg
LockBit Gang to Publish 103GB of Bangkok Air Customer Data

LockBit Gang to Publish 103GB of Bangkok Air Customer Data

The airline announced the breach on Thursday, and the ransomware gang started a...

bg
Winning the Cyber-Defense Race: Understand the Finish Line

Winning the Cyber-Defense Race: Understand the Finish Line

Kerry Matre, Mandiant senior director, clears up misconceptions about the value...

bg
Parallels Offers ‘Inconvenient’ Fix for High-Severity Bug

Parallels Offers ‘Inconvenient’ Fix for High-Severity Bug

Firm offers guidance on how to mitigate a five-months-old privilege escalation bug...

bg
Critical Azure Cosmos DB Bug Allows Full Cloud Account Takeover

Critical Azure Cosmos DB Bug Allows Full Cloud Account...

It's unclear if Microsoft customers were breached during the months-long period...

This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies.