Source
DARKReading
A previously unidentified threat group uses open source malware and phishing to conduct cyber-espionage on shipping and medical labs associated with COVID-19 treatments and vaccines.
A novel threat group, utilizing new malware, is out in the wild. But the who, what, where, and why are yet to be determined, and there's evidence of a false-flag operation.
Cybercriminals and hacktivists have joined state-backed actors in using sabotage-bent malware in destructive attacks, new report shows.
Security Pro File: The old-school hacker traces a path from young hardware tinkerer to senior cybersecurity executive.
Eliminate passwords in user authentication workflow with Vault Vision's passkey features like facial recognition, fingerprint and pin verification on all modern devices.
As a data security solution focused solely on SaaS ecosystems, Metomic will use the Series A funding round to expand into the U.S.
Before adopting SaaS apps, companies should set security guardrails to vet new vendors and check security integration for misconfiguration risks.
(ISC)2 members and cybersecurity professionals worldwide are encouraged to share their expertise, best practices and experiences with their peers and career hopefuls.
CloudNativeSecurityCon North America 2023 was a vendor-neutral cloud-native security conference. Here's why it was important.