Source
DARKReading
In the Play Store's ToS, a paragraph says Google may remove "harmful" applications from users' devices. Is that a step too far?
New Cyberseek™ data shows US is short nearly 530,000 skilled cybersecurity staff.
The security vulnerability allows attackers to spoof a target certificate and masquerade as any website, among other things.
Encrypted backups for several GoTo remote work tools were exfiltrated from LastPass, along with encryption keys.
Don't make perfect the enemy of good in vulnerability management. Context is key — prioritize vulnerabilities that are actually exploitable. Act quickly if the vulnerability is on a potential attack path to a critical asset.
The DPRK has turned crypto scams into big business to replenish its depleted state coffers.
Some predictions about impending security challenges, with a few tips for proactively addressing them.