Security
Headlines
HeadlinesLatestCVEs

Source

DARKReading

Selecting the Right Authentication Protocol for Your Business

Prioritizing security and user experience will help you build a robust and reliable authentication system for your business.

DARKReading
#web#ios#apple#google#js#git#oauth#auth#ssl
NSA Updates Zero-Trust Advice to Reduce Attack Surfaces

Agency encourages broader use of encryption, data-loss prevention, as well as data rights management to safeguard data, networks, and users.

TA547 Uses an LLM-Generated Dropper to Infect German Orgs

It's finally happening: Rather than just for productivity and research, threat actors are using LLMs to write malware. But companies need not worry just yet.

Medusa Gang Strikes Again, Hits Nearly 300 Fort Worth Property Owners

Though a municipal agency assures the public that few are affected, hundreds have their data held ransom for $100,000 by the ransomware gang.

Attack on Consumer Electronics Manufacturer boAt Leaks Data on 7.5M Customers

In a cyberattack more reminiscent of the 2010s, a seemingly lone hacker fleeced a major corporation for millions of open customer records.

Cagey Phishing Campaign Delivers Multiple RATs to Steal Windows Data

Various anti-detection features, including the use of the ScrubCrypt antivirus-evasion tool, fuel an attack that aims to take over Microsoft Windows machines.

How Nation-State DDoS Attacks Impact Us All

Global organizations and geopolitical entities must adopt new strategies to combat the growing sophistication in attacks that parallel the complexities of our new geopolitical reality.

Top MITRE ATT&CK Techniques and How to Defend Against Them

A cheat sheet for all of the most common techniques hackers use, and general principles for stopping them.

Google Gives Gemini a Security Boost

Google has integrated Mandiant's security offerings into its AI platform to detect, stop, and remediate cybersecurity attacks as quickly as possible.

New Jamf Tools Give Enterprise IT Security and Compliance Controls

The device management company introduced a Fleet Hardening Score and Privilege Escalation (the good kind) to its endpoint security platform for Apple devices.