Security
Headlines
HeadlinesLatestCVEs

Source

DARKReading

North Korea's Kimsuky APT Keeps Growing, Despite Public Outing

Kim Jong Un's Swiss Army knife APT continues to spread its tendrils around the world, showing it's not intimidated by the researchers closing in.

DARKReading
#vulnerability#mac#windows#microsoft#auth#chrome
'EvilExtractor' All-in-One Stealer Campaign Targets Windows User Data

An uptick in EvilExtractor activity aims to compromise endpoints to steal browser from targets across Europe and the US, researchers say.

Intel Prioritizes Security in Latest vPro Chips

While Intel is building more hardware protections directly into the chips, enterprises still need a strategy for applying security updates on these components.

Shadow IT, SaaS Pose Security Liability for Enterprises

Software written or acquired outside of IT's purview is software that IT can't evaluate for security or compliance.

The Tangled Web of IR Strategies

Attackers have their methods timed to the second, and they know they have to get in, do their damage, and get out quickly. CISOs today must detect and block in even less time.

'GhostToken' Opens Google Accounts to Permanent Infection

A bug in how Google Cloud Platform handles OAuth tokens opened the door to Trojan apps that could access anything in users' personal or business Google Drives, Photos, Gmail, and more.

New Policy Group Wants to Improve Cybersecurity Disclosure, Support Researchers

The new Security Legal Research Fund and Hacking Policy Council are aimed at protecting "good faith" security researchers from legal threats and giving them a voice in policy discussions.

OpenSSF Adds Software Supply Chain Tracks to SLSA Framework

The Open Source Security Foundation's SLSA v1.0 release is an important milestone in improving software supply chain security and providing organizations with the tools they need to protect their software.