Security
Headlines
HeadlinesLatestCVEs

Source

DARKReading

Name That Toon: One by One

Feeling creative? Submit your caption and our panel of experts will reward the winner with a $25 Amazon gift card.

DARKReading
#vulnerability#amazon
Circle Security Technology Partnership With ForgeRock to Accelerate the Prevention-First Era in Digital Security

Joint integration delivers effective DSPM enforcement for self-managed customers starting with credential-free access, risk-based continuous authentication, and protection from data exposure.

Severe RCE Bugs Open Thousands of Industrial IoT Devices to Cyberattack

Researchers found 11 vulnerabilities in products from three industrial cellular router vendors that attackers can exploit through various vectors, bypassing all security layers.

4 Big Mistakes to Avoid in OT Incident Response

What works in IT may not in an operational technology/industrial control systems environment where availability and safety of operations must be maintained.

'MichaelKors' Showcases Ransomware's Fashionable VMware ESXi Hypervisor Trend

Wide use and lack of support for malware detection technologies has made VMware's virtualization technology a prime target for cyberattackers.

Lacework Appoints Lea Kissner as Chief Information Security Officer

Former Humu, Google, and Twitter security leader adds deep security experience.

PharMerica Leaks 5.8M Deceased Users' PII, Health Information

Relatives are being alerted that a PharMerica compromise exposed the sensitive data of their deceased loved ones, which could be used for identity theft.

RA Ransomware Group Emerges With Custom Spin on Babuk

The freshly minted ransomware gang is customizing leaked Babuk source code to go after cyber targets in the US and South Korea — and it's expanding its operations quickly.

Generative AI Empowers Users but Challenges Security

With the introduction of generative AI, even more business users are going to create low-code/no-code applications. Prepare to protect them.

Break the DDoS Attack Loop With Rate Limiting

This Tech Tip demonstrates how security engineers can best use rate limits to mitigate distributed denial-of-service attacks.