Security
Headlines
HeadlinesLatestCVEs

Source

DARKReading

Russian SolarWinds Culprits Launch Fresh Barrage of Espionage Cyberattacks

The threat group behind the SolarWinds supply chain attacks is back with new tools for spying on officials in NATO countries and Africa.

DARKReading
#web#mac#microsoft#dos#git#java#intel#perl#pdf#auth
Why xIoT Devices Are Cyberattackers' Gateway Drug for Lateral Movement

Detailing how extended IoT (xIoT) devices can be used at scale by attackers to establish persistence across networks and what enterprises should start doing about the risk.

Software-Dependency Data Delivers Security to Developers

Google has opened up its software-dependency database, adding to the security data available to developers and toolmakers. Now developers need to use it.

Security Is a Revenue Booster, Not a Cost Center

Focusing on what customers and partners need from a company can help CISOs show the real financial benefits of improving cybersecurity.

The Internet Reform Trilemma

An "open" Internet faces challenges from autocratic governance models. Policymakers should instead think about creating an Internet that's equitable, inclusive, and secure.

Majority of US IT Pros Told to Keep Quiet About Data Breaches

To report or not report? While more than half of all companies have suffered a data breach, 71% of IT professionals say they have been told to not report an incident, which could mean legal jeopardy.

Legion Malware Marches onto Web Servers to Steal Credentials, Spam Mobile Users

A novel credential harvester compromises SMTP services to steal data from a range of hosted services and providers, and can also launch SMS-based spam attacks against devices using US mobile carriers.

How to Define Tier-Zero Assets in Active Directory Security

There are plenty of AD objects and groups that should be considered tier zero in every environment, but some will vary among organizations.

Google Tackles Open Source Security With New Dependency Service

With deps.dev API and Assured OSS, Google is addressing the common challenges software developers face in securing the software supply chain.