Source
DARKReading
Feeling creative? Submit your caption and our panel of experts will reward the winner with a $25 Amazon gift card.
Trend Micro will be joining Google's App Defense Alliance (ADA) to help improve their ability to identify malicious apps before they are published to the Google Play store.
DoJ charges allege they hacked into the taxi dispatch system for profit, selling the ability for cab drivers to skip the line for picking up a fare at JFK terminals.
The first step toward securing Kubernetes environments is understanding the risks they pose and identifying the ways in which those risks can be mitigated.
The open source container tool is quite popular among developers — and threat actors. Here are a few ways DevOps teams can take control.
The malware has resurfaced, using an icon and name similar to the legitimate Google Play app MYT Music, a popular app with more than 10 million downloads.
Employee education, biometric and adaptive authentication, and zero trust can go a long way in strengthening security.
Automating your defenses can bring good tidings of great joy.
Lower cybersecurity awareness coupled with vulnerable OT gear makes manufacturers tempting targets, but zero trust can blunt attackers’ advantages.