Security
Headlines
HeadlinesLatestCVEs

Source

DARKReading

Once Again, Malware Discovered Hidden in npm

Turkorat-poisoned packages sat in the npm development library for months, researchers say.

DARKReading
#mac#windows#google#microsoft#nodejs#js#git#java#asp.net
LexisNexis Risk Solutions Cybercrime Report Reveals 20% Annual Increase in Global Digital Attack Rate

Elevated attack rate expected to remain during 2023 as cybercrime becomes more sophisticated and widespread.

WithSecure Launches New Range of Incident Response and Readiness Services

New retainer provides expert support starting in the first 72 hours of the incident response process to contain the attack and improve preparedness for the future.

3 Ways Hackers Use ChatGPT to Cause Security Headaches

As ChatGPT adoption grows, the industry needs to proceed with caution. Here's why.

ActZero Teams Up With UScellular to Secure Mobile Devices From Ransomware Attacks

AI-powered cyber defense service protects against phishing attacks for businesses on unlimited handset plans.

LayerZero Labs Launches $15M Bug Bounty; Largest in the World

Launched in partnership with Immunefi, bounty to promote Web3 security.

Eagle Eye Networks and Brivo Announce $192M Investment — One of the Largest Ever in Cloud Physical Security

SECOM CO., LTD, a $15B enterprise and one of the largest security integration companies in the world, invests in the two global cloud physical security leaders, accelerating the use of AI and improving safety and security.

Lemon Group Uses Millions of Pre-Infected Android Phones to Enable Cybercrime Enterprise

Lemon Group's Guerrilla malware model an example of how threat actors are monetizing compromised Android devices, researchers say.

5 Ways Security Testing Can Aid Incident Response

Organizations can focus on these key considerations to develop their cybersecurity testing programs sustainably.

BianLian Cybercrime Group Changes Up Extortion Methods, Warns CISA

CISA urges small and midsized organizations as well as critical infrastructure to implement mitigations immediately to shield themselves from further data exfiltration attacks.