Security
Headlines
HeadlinesLatestCVEs

Source

DARKReading

Google's .zip, .mov Domains Give Social Engineers a Shiny New Tool

Security professionals warn that Google's new top-level domains, .zip and .mov, pose social engineering risks while providing little reason for their existence.

DARKReading
#web#google#git#intel
OAuth Flaw in Expo Platform Affects Hundreds of Third-Party Sites, Apps

A cybersecurity vulnerability found in an implementation of the social login functionality opens the door to account takeovers and more.

How Universities Can Bridge Cybersecurity's Gender Gap

It's time to invest in initiatives that engage young women in cybersecurity early and often.

Israeli Shipping, Logistics Companies Targeted in Watering Hole Attacks

Researchers say the Iranian nation-state actor known as Tortoiseshell could be behind the attacks.

How AI Can Help Organizations Adapt and Recover From Cyberattacks

Incident response playbooks and frameworks are leaving defenders ill-equipped to recover from the increasing number of successful cyberattacks. Developments in AI offer a new way for stretched teams to manage security incidents and heal swiftly.

5 Questions to Ask When Evaluating a New Cybersecurity Technology

Any new cybersecurity technology should be not just a neutral addition to a security stack but a benefit to the other technologies or people managing them.

Google Adds Guardrails to Keep AI in Check

Companies are starting to address the misuse of artificial intelligence (AI). At Google I/O, for example, executives promised its AI has safety measures.

SuperMailer Abuse Bypasses Email Security for Super-Sized Credential Theft

Secure email gateways and end users alike are being fooled by a cyberattack campaign that's enjoying skyrocketing volumes against businesses in every industry, globally.

What Security Professionals Need to Know About Aggregate Cyber-Risk

Widespread cyber incidents will happen, but unlike natural disasters, specific security controls can help prevent a catastrophe.

FBI: Human Trafficking Rings Force Job Seekers Into Cryptojacking Schemes

Victims of the cybercrime schemes are coerced to participate through violence and having their belongings taken away.