Security
Headlines
HeadlinesLatestCVEs

Source

DARKReading

Chip Giant TSMC Blames $70M LockBit Breach on IT Hardware Supplier

The group has given one of Apple's biggest semiconductor suppliers until Aug. 6 to pay $70 million or risk having its data and "points of entry" to its network publicly leaked.

DARKReading
#vulnerability#apple#microsoft#cisco#vmware
Mobile Cyberattacks Soar, Especially Against Android Users

The number of malware samples is up as attackers aim to compromise users where they work and play: Their smartphones.

Nokod Raises $8M Seed Round From Seasoned Cybersecurity Investors to Enhance Low-Code/No-Code App Security

Nokod Security is building a platform that enables organizations to secure in-house low-code/no-code custom applications by scanning for security and compliance issues and applying remediation policies

Iran-Linked APT35 Targets Israeli Media With Upgraded Spear-Phishing Tools

The APT35 group (aka Charming Kitten) has added backdoor capabilities to their spear-phishing payloads — and targeted an Israeli reporter with it.

African Nations Face Escalating Phishing & Compromised Password Cyberattacks

Cyberattacks against organizations in some African nations increased significantly in 2022, despite a major expansion in cybersecurity hiring to support cloud and digital migration.

Russian Hacktivist Platform 'DDoSia' Grows Exponentially

As cybercrime amidst the Russia-Ukraine war continues to escalate, the DDoSia project, launched by a known hacktivist group, has exploded in its number of members and quality of tools used for attacks.

Make Diversity the 'How,' Not the 'What,' of Cybersecurity Success

Cybersecurity leaders should strive to reward high-performing teams that are powered by high levels of inclusion.

IP Fabric Announces $25M Series B Funding to Accelerate Adoption of Network Assurance

One Peak investment will advance the ubiquity of network assurance, helping organizations to reduce network complexity, assure network automation, and improve network security.

Perception Point Unveils AI Model to Thwart Generative AI-Based BEC Attacks

The detection model identifies LLM patterns to counter the rising abuse of generative AI in social engineering attacks.

CISA BOD 23-01: What Agencies Need to Know About Compliance

The new network visibility mandate provides a good foundation for identifying risks and building better security programs at federal agencies.