Source
DARKReading
A recent campaign shows that the politically motivated threat actor has more tricks up its sleeve than previously known, targeting an old RCE flaw and wiping logs to cover their tracks.
Identity threat detection and response adds user entity behavioral analytics to fraud detection, creating a powerful tool for real-time protection.
Integration provides threat intel teams with an early warning system for geopolitical events that could trigger cyberattacks.
It's unclear why the NSA issued in-depth mitigation guidance for the software boot threat now, but orgs should take steps to harden their environments.
Unknown senders have been shipping smartwatches to service members, leading to questions regarding what kind of ulterior motive is at play, malware or otherwise.
Exploiting a flaw in how the app handles communication with external tenants gives threat actors an easy way to send malicious files from a trusted source to an organization's employees, but no patch is imminent.
For line-of-business execs, the fear of grinding mission-critical systems to a halt overrides the fear of ransomware. How can CISOs overcome this?
Black Hat Asia 2023 showed that cybersecurity is nascent among organizations in Asia with opportunities for improvement.
The impending regulations highlight the increasing importance of enhanced network security and regulatory compliance across the government sector.
Many organizations are unwittingly exposing users of their code repositories to repojacking when renaming projects, a new study shows.