Tackling Vulnerabilities & Errors Head-on for Proactive Security
As attack surfaces increase, partner networks widen, and security teams remain stretched, vulnerabilities and errors continue to be a daunting…
Identity illuminated
As attack surfaces increase, partner networks widen, and security teams remain stretched, vulnerabilities and errors continue to be a daunting…
Consumer Reports has a new study of people-search site removal services, concluding that they don’t really work: As a whole,…
Following the July 19 outages caused by a bad update, the cybersecurity firm faces shareholder lawsuits and pressure to pay…
The American Hospital Association and the Health-ISAC issued a joint threat bulletin warning healthcare IT providers that their ransomware plans…
The U.S. Department of Justice (DoJ) on Thursday charged a 38-year-old individual from Nashville, Tennessee, for allegedly running a “laptop…
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has disclosed that threat actors are abusing the legacy Cisco Smart Install…
At Black Hat USA, security researcher Michael Bargury released a “LOLCopilot” ethical hacking module to demonstrate how attackers can exploit…
Attackers can use a seemingly innocuous IP address to exploit localhost APIs to conduct a range of malicious activity, including…
Microsoft execs detailed the company’s reaction to the CrowdStrike incident and emphasized the value of a collective identity. Microsoft execs…
The North Korea-linked threat actor known as Kimsuky has been linked to a new set of attacks targeting university staff,…