Security
Headlines
HeadlinesLatestCVEs

Source

DARKReading

FIDO Alliance Publishes Guidance for Deploying Passkeys in the Enterprise

Half-day virtual Authenticate Summit to educate on how passkeys can fit into a variety of enterprise environments.

DARKReading
#auth
Saudi Arabia's Cyber Capabilities Ranked Second Globally

Saudi Arabia is one of the world's leaders in cybersecurity development and preparedness, according to the latest rankings.

Generative AI Projects Pose Major Cybersecurity Risk to Enterprises

Developers' enthusiasm for ChatGPT and other LLM tools leaves most organizations largely unprepared to defend against the vulnerabilities that the nascent technology creates.

3 Strategies for Bringing Rigor to Software Security

With the National Cybersecurity Strategy planning to add real teeth into enforcement actions, software vendors have extra incentive to reduce applications' security debt.

Open Source LLM Projects Likely Insecure, Risky to Use

New LLM-based projects typically become successful in a short period of time, but the security posture of these generative AI projects are very low, making them extremely unsafe to use.

UCLA, Siemens Among Latest Victims of Relentless MOVEit Attacks

Cl0p ransomware group uses its Dark Web leak site to identify five new victims of MOVEit cyberattacks.

Jscrambler Launches JavaScript Scanner for PCI DSS 4.0 Compliance

The free tool aims to help organizations meet the requirements of the new version of the payment standard, which takes effect next March.

Protecting Small Businesses From Ransomware on a Budget

One ransomware attack can be devastating for a small or midsize business. Here are four solid survival tips to ensure it doesn't turn into a disaster.

Cequence Security Adds Generative AI to API Security

Cequence's latest updates to its Unified API Protection platform help organizations reduce the time needed to create API security testing plans.

Mockingjay Slips By EDR Tools With Process Injection Technique

By leveraging misconfigured DLLs instead of EDR-monitored APIs, this new technique injects malicious code into running processes, completely evading endpoint security.