Source
DARKReading
State-sponsored cyber espionage actors from Russia and China continue to target WinRAR users with various info-stealing and backdoor malware, as a patching lag plagues the software's footprint.
The state-sponsored threat actors (aka APT34, Crambus, Helix Kitten, or OilRig) spent months seemingly taking whatever government data they wished, using never-before-seen tools.
It's time to build a culture of privacy, one that businesses uphold.
Should CISOs include only known information in the SEC filings for a material security incident, or is there room to include details that may change during the investigation?
The router specialist says the attacker's claims to have heisted millions and millions of records are significantly overblown. But an incident did happen, stemming from a successful phish.
The sensitive nature of medical records, combined with providers' focus on patient care, make small doctor's offices ideal targets for cyber extortion.
Analysis of more than 1.8 million admin portals reveals IT leaders, with the highest privileges, are just as lazy about passwords as everyone else.
Under the Security Appraisal Framework and Enablement (SAFE) program, device manufacturers will be able to work with approved auditors to verify firmware.
The latest threat to Citrix NetScaler, CVE-2023-4966, was exploited as a zero-day bug for months before a patch was issued. Researchers expect exploitation efforts to surge.
Endpoint management based on open source agents, such as osquery, could simplify IT management and security while giving larger firms more customization options.