Security
Headlines
HeadlinesLatestCVEs

Source

DARKReading

Zoom Zoom: 'Dark Power' Ransomware Extorts 10 Targets in Less Than a Month

A new threat actor is racking up victims and showing unusual agility. Part of its success could spring from the use of the Nim programming language.

DARKReading
#web#auth
Malicious ChatGPT Extensions Add to Google Chrome Woes

The second malicious ChatGPT extension for Chrome has been discovered, giving malicious actors access to users' Facebook accounts through stolen cookies.

Red Teaming at Scale to Uncover Your Big Unknowns

A contrarian mindset with applied imagination allows security professionals to assess problems in their organizations, prevent failures, and mitigate vulnerabilities.

Application Security Requires More Investment in Developer Education

If you haven't done so already, it's time to take the first step toward solving this application security dilemma.

Open Source Vulnerabilities Still Pose a Big Challenge for Security Teams

Open source software continues to pose a challenge for companies. With the proper security practices, you can reduce your open source risk and manage it.

'Nexus' Android Malware Targets Customers of 450 Financial Institutions Worldwide

Nexus, offered in a malware-as-a-service model, is the latest in a vast and growing array of trojans targeting mobile banking and cryptocurrency applications.

Bundestag Bungle: Political Microtargeting of Facebook Users Draws Ire

With shades of the Cambridge Analytica scandal, German political parties skirted consumer data privacy regulations during the country's last parliamentary election, a privacy watchdog warns.

The Board of Directors Will See You Now

Help the board understand where the business is vulnerable, where controls end, and where exposure begins.

Epidemic of Insecure Storage, Backup Devices Is a Windfall for Cybercriminals

Enterprise storage devices have 14 security weaknesses on average, putting them at risk of compromise by cyberattackers and especially ransomware attacks.

MITRE Rolls Out Supply Chain Security Prototype

Cloud-based System of Trust application now available for test-driving quantitative risk assessment of suppliers of hardware, software, services.