Security
Headlines
HeadlinesLatestCVEs

Source

DARKReading

Microsoft Digital Defense Report: Nation-State Threats and Cyber Mercenaries

In part three of this three-part series, Microsoft dissects these twinned threats and what organizations can do to reduce or eliminate their risk.

DARKReading
#vulnerability#microsoft#git#intel#auth#zero_day
Unpatched Wemo Smart Plug Bug Opens Countless Networks to Cyberattacks

Cyberattckers can easily exploit a command-injection bug in the popular device, but Belkin has no plans to address the security vulnerability.

Attackers Target macOS With 'Geacon' Cobalt Strike Tool

Threat actors seen using Go-language implementation of the red-teaming tool on Intel and Apple silicon-based macOS systems.

XM Cyber Announces Partnership With SAP to Deliver Robust Security for Hybrid Environments

Partnership will provide SAP customers with comprehensive exposure management capabilities and in-depth visibility of attack surfaces.

Russian Ransomware Perp Charged After High-Profile Hive, Babuk & LockBit Hits

LockBit, Babuk, and Hive ransomware used by Russian to target critical US organizations, DOJ says.

Qilin Ransomware Operation Outfits Affiliates With Sleek, Turnkey Cyberattacks

Researchers infiltrate a ransomware operation and discover slick services behind Qilin's Rust-based malware variant.

Name That Toon: One by One

Feeling creative? Submit your caption and our panel of experts will reward the winner with a $25 Amazon gift card.

Circle Security Technology Partnership With ForgeRock to Accelerate the Prevention-First Era in Digital Security

Joint integration delivers effective DSPM enforcement for self-managed customers starting with credential-free access, risk-based continuous authentication, and protection from data exposure.

Severe RCE Bugs Open Thousands of Industrial IoT Devices to Cyberattack

Researchers found 11 vulnerabilities in products from three industrial cellular router vendors that attackers can exploit through various vectors, bypassing all security layers.

4 Big Mistakes to Avoid in OT Incident Response

What works in IT may not in an operational technology/industrial control systems environment where availability and safety of operations must be maintained.