Source
DARKReading
New research shows that 57 vulnerabilities that threat actors are currently using in ransomware attacks enable everything from initial access to data theft.
A growing group of OWASP members and board leaders are calling for the AppSec group to make big changes to stay apace with modern development.
Established network security players like Check Point are responding to the shift to cloud-native applications, which have exposed more vulnerabilities in open source software supply chains.
The primary victims so far have been employees of telcos in the Middle East, who were hit with custom backdoors via the cloud, in a likely precursor to a broader attack.
BEC gangs Midnight Hedgehog and Mandarin Capybara show how online marketing and translation tools are making it easy for these threat groups to scale internationally.
The long-time NSA and cyber specialist says he's exiting the public sector.
The snow sports specialist is investigating to see what caused the operations-disrupting "cyber incident."
Weeks after an exploit was first announced in a popular cloud-based file transfer service, could some organizations still be vulnerable? The answer is yes.
With a rearranging of priorities and good incident response plans, organizations can be ready to face the future of software attacks.
New ESXiArgs-ransomware attacks include a workaround for CISA's decryptor, researchers find.