Security
Headlines
HeadlinesLatestCVEs

Source

DARKReading

Majority of Ransomware Attacks Last Year Exploited Old Bugs

New research shows that 57 vulnerabilities that threat actors are currently using in ransomware attacks enable everything from initial access to data theft.

DARKReading
#sql#vulnerability#microsoft#amazon#linux#red_hat#apache#java#oracle#intel#rce#vmware
Is OWASP at Risk of Irrelevance?

A growing group of OWASP members and board leaders are calling for the AppSec group to make big changes to stay apace with modern development.

Check Point Boosts AppSec Focus With CNAPP Enhancements

Established network security players like Check Point are responding to the shift to cloud-native applications, which have exposed more vulnerabilities in open source software supply chains.

Novel Spy Group Targets Telecoms in 'Precision-Targeted' Cyberattacks

The primary victims so far have been employees of telcos in the Middle East, who were hit with custom backdoors via the cloud, in a likely precursor to a broader attack.

Google Translate Helps BEC Groups Scam Companies in Any Language

BEC gangs Midnight Hedgehog and Mandarin Capybara show how online marketing and translation tools are making it easy for these threat groups to scale internationally.

Inglis Retires as National Cyber Director Ahead of Biden's Cybersecurity EO

The long-time NSA and cyber specialist says he's exiting the public sector.

Not Stoked: Burton Snowboards' Online Orders Disrupted After Cyberattack

The snow sports specialist is investigating to see what caused the operations-disrupting "cyber incident."

Massive GoAnywhere RCE Exploit: Everything You Need to Know

Weeks after an exploit was first announced in a popular cloud-based file transfer service, could some organizations still be vulnerable? The answer is yes.

AppSec Threats Deserve Their Own Incident Response Plan

With a rearranging of priorities and good incident response plans, organizations can be ready to face the future of software attacks.

ESXi Ransomware Update Outfoxes CISA Recovery Script

New ESXiArgs-ransomware attacks include a workaround for CISA's decryptor, researchers find.