Source
DARKReading
Amazon Security Lake will allow organizations to create a purpose-built, standards-based data lake to aggregate and store security data.
The threat actor behind an August intrusion used data from that incident to access customer data stored with a third-party cloud service provider, and affiliate GoTo reports breach of development environment.
A vulnerability discovered in GitHub Actions could allow an attacker to poison a developer's pipeline, highlighting the risk that insecure software pipelines pose.
Though there have been fewer than expected publicly reported attacks involving the vulnerability, nearly three-quarters of organizations remain exposed to it.
The Hell's Keychain attack vector highlights common cloud misconfigurations and secrets exposure that can pose grave risk to enterprise customers.
As consumers catch on to the dangers, protection could become a major topic for legislative bodies.
No longer the realm of lone wolves, the world of cybercrime is increasingly strategic, commoditized, and collaborative.
Market drivers include new regulations, increasing automobile complexity, and new vehicle types.
Ratings ranged from AAA to CC, with security effectiveness scores from 27% to 100%.
Know what you need to fix today and what you don’t.