Security
Headlines
HeadlinesLatestCVEs

Source

DARKReading

Phishing Emails Up a Whopping 569% in 2022

Credential phishing emails are the clear favorite of threat actors, with a 478% spike last year, new research shows.

DARKReading
#vulnerability#web#mac
Cybersecurity Investment Outlook Remains Grim as Funding Activity Sharply Declines

Security analysts expect little improvement until at least the second half of the year.

Using Observability to Power a Smarter Cybersecurity Strategy

With an infrastructure for observability, security teams can make better decisions about access and identity-based threats.

Google: Commercial Spyware Used by Governments Laden With Zero-Day Exploits

Google TAG researchers reveal two campaigns against iOS, Android, and Chrome users that demonstrate how the commercial surveillance market is thriving despite government-imposed limits.

The CISO Mantra: Get Ready to Do More With Less

For the foreseeable future, with the spigots closing shut, CISOs will need to find ways to do more with less.

How Does Data Literacy Enhance Data Security?

With the rise in cloud-based security concerns and other issues, organizations must improve data literacy across the enterprise.

Microsoft Security Copilot Uses GPT-4 to Beef Up Security Incident Response

Microsoft's new AI assistant tool helps cybersecurity teams investigate security incidents and hunt for threats.

MacStealer Malware Plucks Bushels of Data From Apple Users

A novel cyber threat against macOS users is being sold for $100 a pop on the Dark Web, and activity is ramping up.

NullMixer Polymorphic Malware Variant Infects 8K Targets in Just a Month

The NullMixer loader has compromised thousands of endpoints in the US, France, and Italy, stealing data and selling it to Dark Web data dealers, all without setting off alarm bells.

Millions of Pen Tests Show Companies' Security Postures Are Getting Worse

A lack of website protections, Sender Policy Framework (SPF) records, and DNSSEC configurations leave companies open to phishing and data exfiltration attacks.