Source
DARKReading
What's scarier than keeping all of your passwords in one place and having that place raided by hackers? Maybe reusing insecure passwords.
The system based on deep reinforcement learning can adapt to defenders' tactics and stop 95% of simulated attacks, according to its developers.
New research shows that 57 vulnerabilities that threat actors are currently using in ransomware attacks enable everything from initial access to data theft.
A growing group of OWASP members and board leaders are calling for the AppSec group to make big changes to stay apace with modern development.
Established network security players like Check Point are responding to the shift to cloud-native applications, which have exposed more vulnerabilities in open source software supply chains.
The primary victims so far have been employees of telcos in the Middle East, who were hit with custom backdoors via the cloud, in a likely precursor to a broader attack.
BEC gangs Midnight Hedgehog and Mandarin Capybara show how online marketing and translation tools are making it easy for these threat groups to scale internationally.
The long-time NSA and cyber specialist says he's exiting the public sector.
The snow sports specialist is investigating to see what caused the operations-disrupting "cyber incident."
Weeks after an exploit was first announced in a popular cloud-based file transfer service, could some organizations still be vulnerable? The answer is yes.