Security
Headlines
HeadlinesLatestCVEs

Source

DARKReading

Microsoft Zero-Day Bugs Allow Security Feature Bypass

Security vendors urge organizations to fix the actively exploited bugs, in Microsoft Outlook and the Mark of the Web feature, immediately.

DARKReading
#vulnerability#web#mac#windows#microsoft#rce#auth#zero_day
Samsung Next Invests in Mitiga, Brings Total Funding to $45M

Financing will help support increasing customer demand while continuing to transform incident response for cloud and SaaS environments

LockBit Threatens to Leak Stolen SpaceX Schematics

The ransomware group sent a message directly to Elon Musk: Pay or the confidential SpaceX information goes up for grabs on the Dark Web.

CISA Trials Ransomware Warning System for Critical Infrastructure Orgs

An agency team will identify vulnerabilities being exploited by ransomware groups and alert organizations ahead of attacks, CISA says.

Access Control Gap in Microsoft Active Directory Widens Enterprise Attack Surface

One researcher thinks trust is broken in AD. Microsoft disagrees that there's a security vulnerability. But enterprise IT environments should be aware of an authentication gap either way.

Deepfakes, Synthetic Media: How Digital Propaganda Undermines Trust

Organizations must educate themselves and their users on how to detect, disrupt, and defend against the increasing volume of online disinformation.

Emotet, QSnatch Malware Dominate Malicious DNS Traffic

An analysis of trillions of DNS requests shows a shocking amount of malicious traffic inside enterprise networks, with threats using DNS as a sort of malicious Autobahn.

Why Healthcare Boards Lag Other Industries in Preparing for Cyberattacks

Only by working collaboratively can boards and security leaders make progress and agree about cybersecurity threats and priorities.

Orgs Have a Long Way to Go in Securing Remote Workforce

Organizations recognize that they are responsible for protecting remote workers from cyber threats, but they have a long way to go in deploying the necessary security technologies.