Security
Headlines
HeadlinesLatestCVEs

Source

DARKReading

Fraudsters Siphon $360M From Retailers Using 50M Fake Shoppers

Cyberattackers focused on ad fraud and clickjacking stole millions during Black Friday by hijacking shopper accounts and tying up transactions.

DARKReading
#web#git#java
Android Serves Up a Slew of Security Updates, 4 Critical

Out of more than 80 flaws fixed this month, the most critical was a system component bug that could allow RCE over Bluetooth.

Key Security Announcements From AWS re:Invent 2022

At AWS re:Invent last week, the cloud giant previewed security services including Amazon Security Lake for security telemetry, Verified Permissions for developers, and a VPN bypass service.

4 Arrested for Filing Fake Tax Returns With Stolen Data

Cybercrooks allegedly stole personal data, used it to file IRS tax documents, and routed refunds to bank accounts under their control.

Will New CISA Guidelines Help Bolster Cyber Defenses?

Learn how BOD 23-01 asset inventory mandates can help all organizations tighten cybersecurity.

Piiano Equips Developers to Stop Sensitive Data Breaches

Data protection company Piiano officially launches a vault for sensitive customer data, the first among a suite of privacy tools for developers.

3 xIoT Attacks Companies Aren't Prepared For

A world of increasingly connected devices has created a vast attack surface for sophisticated adversaries.

San Francisco Rolls Back Its Plan for Killer Robots

After an uproar, the city board voted to rescind last week's bill to allow police to use robots to deliver deadly force. The fight isn't over, but there's a good reason it should be.

Cybersecurity Resilience Emerges as Top Priority as 62% of Companies Say Security Incidents Impacted Business Operations

Cisco's annual Security Outcomes Report shows executive support for a security culture is growing. It identifies the top seven success factors that boost enterprise security resilience, with a focus on cultural, environmental, and solution-based factors that businesses leverage to achieve security.

Zerobot Weaponizes Numerous Flaws in Slew of IoT Devices

The botnet exploits flaws in various routers, firewalls, network-attached storage, webcams, and other products and allows attackers to take over affected systems.