Security
Headlines
HeadlinesLatestCVEs

Source

DARKReading

How CISOs Can Reduce the Danger of Using Data Brokers

Without proof that it was collected legally, purchased data can threaten an enterprise's security compliance and even expose the company to litigation.

DARKReading
#mac#perl#aws#auth
CISA Releases Hunt Tool for Microsoft's Cloud Services

CISA released the hunt and response tool to help defenders extract cloud artifacts without performing additional analytics.

Clop Keeps Racking Up Ransomware Victims With GoAnywhere Flaw

After several weeks and more than 130 ransomware victims, GoAnywhere parent company Forta issues a statement.

Twitter's Source Code Leak on GitHub a Potential Cyber Nightmare

Indicators point to Twitter's source code being publicly available for around three months, offering a developer security object lesson for businesses.

7 Women Leading the Charge in Cybersecurity Research & Analysis

From rising stars to veterans heading up research teams, check out our profiles of women making a big impact in cyber defense as the threat landscape expands.

Drive to Pervasive Encryption Boosts Key Management

Key vaults, aka key-management-as-a-service (KMaaS), promise to allow companies to encrypt sensitive data across cloud and third parties with granular control.

Cybersecurity vs. Everyone: From Conflict to Collaboration

Don't assume stakeholders outside security understand your goals and priorities, but consider how you'll communicate with them to gain their support.

CyberSecure Announces Strategic Alliance

The joint partnership represents expanded market opportunities.

Tesla Model 3 Hacked in Less Than 2 Minutes at Pwn2Own Contest

In two days, ethical researchers from 10 countries have unearthed more than 22 zero-day bugs in a wide range of technologies at the annual hacking contest.

GitHub's Private RSA SSH Key Mistakenly Exposed in Public Repository

GitHub hastens to replace its RSA SSH host key after an exposure mishap threatens users with man-in-the-middle attacks and organization impersonation.