Source
DARKReading
A misconfigured cloud instance exposed vehicle data, but not personally identifiable information, the car maker says.
A two-bit comedian is using a patched Microsoft vulnerability to attack the hospitality industry, and really laying it on thick along the way.
A predictable patch cadence is nice, but the software giant can do more.
US Transportation Security Agency (TSA) administrator reflects on how the Colonial Pipeline incident has moved the needle in public-private cooperation.
The privilege escalation flaw is one in thousands that researchers have disclosed in recent years.
The deal will enhance the capabilities of both companies and provide customers with a more comprehensive way to protect their digital assets.
Retired hardware and forgotten cloud virtual machines are a trove of insecure confidential data. Here's how to ameliorate that weakness.
Dubbed "ChattyGoblin," the China-backed actors use chatbots to scam Southeast Asian gambling companies.
The Technology Innovation Institute’s year-long cryptographic challenges invite participants to assess the concrete hardness of McEliece public-key encryption scheme.
One long-awaited security move caused a ripple effect in the cybercrime ecosystem.