Discover and connect with journalists and influencers around the world, save time on email research, monitor the news, and more.
Recent: |
|
Past: |
|
Attackers apparently used data taken in an August attack on the password management firm to enable another attack in November. → Read More
Documents reportedly including passport scans, staff pay scales, and contract details stolen by cybercrime group Vice Society, which has targeted education in multiple countries. → Read More
Changes include the Web Software Module to help payment software vendors and developers identify and implement security controls to protect against attacks. → Read More
Cybersecurity vendor layoffs raise several issues for CISOs and customers, not the least of which are security and risk-related factors. Here are 8 things to consider if your security vendor has announced significant staff cuts. → Read More
AWS announces new cybersecurity features in Amazon Inspector and Amazon Macie at AWS Re:Invent 2022 in Las Vegas. → Read More
Palo Alto’s Unit 42 investigated several incidents linked to the Luna Moth callback phishing extortion campaign that uses legitimate and trusted management tools instead of malware to exploit businesses. → Read More
Security teams must update their security incident reporting policies and processes to account for remote work or risk exposure to increased threats. → Read More
Web proxy support and SaaS security posture management (SSPM) are among new Nova security features designed to help businesses tackle zero-day threats. → Read More
Security operations center leaders and staff report numerous pain points impacting SOC performance. → Read More
A Booz Allen Hamilton report outlines global cyberthreats posed by the People’s Republic of China and gives some guidance on how to counter them. → Read More
From eyeglass reflections and new job postings to certificate transparency logs and discarded printers, employees have odd ways to unintentionally expose data.. → Read More
A SOC-specific user interface that supports analyst workflows and enhanced predicative threat intelligence capabilities are among the new features. → Read More
Attacker likely bought employee account credentials on the dark web and then escalated privileges to access internal tools. → Read More
Vendors, collectives and governments are contributing to improve the security of open-source code, software, and development amid organizations’ increasing use of open-source resources. → Read More
Data security and privacy risks surrounding in-app browsers have been making headlines. These are the threats they pose and steps needed to minimize them. → Read More
A new report shows that significantly more CVEs will be published this year, and that some organizations are still vulnerable from older, unpatched CVEs. → Read More
From March 2023, Lloyd’s of London will require all its insurer groups to exclude liability for losses arising from state-backed cyberattacks. → Read More
Threats surrounding Virtual Network Computing laid bare as attacks targeting critical infrastructure increase. → Read More
Cisco says an employee’s credentials were compromised after an attacker gained control of a personal Google account. → Read More
The new feature leverages millions of examples of malicious activity to more accurately identify signs of an attack. → Read More