Security
Headlines
HeadlinesLatestCVEs

Source

DARKReading

Australia Declares War on Cybercrime Syndicates

An international counter-ransomware task force has been announced by Australian authorities following the recent Optus and Medibank data breaches.

DARKReading
#vulnerability#intel#auth
Unpatched Zimbra Platforms Are Probably Compromised, CISA Says

Attackers are targeting Zimbra systems in the public and private sectors, looking to exploit multiple vulnerabilities, CISA says.

Privacy4Cars Secures Fourth Patent to Remove Privacy Information From Vehicles and Create Compliance Logs

Data-deletion service's patent covers removing personal information such as geolocation, biometrics, and phone records from a vehicle by using a user-computing device

Quantum Cryptography Apocalypse: A Timeline and Action Plan

Quantum computing's a clear threat to encryption, and post-quantum crypto means adding new cryptography to hardware and software without being disruptive.

How APIs and Applications Can Live Happily Ever After

Solutions that allow businesses to reduce complexity, develop and deploy applications and APIs, and protect those applications and APIs are no fairy tale.

Why Cybersecurity Should Highlight Veteran-Hiring Programs

Military veterans tend to have the kind of skills that would make them effective cybersecurity professionals, but making the transition is not that easy.

Cybersecurity 'Nutrition' Labels Still a Work in Progress

Pretty much every aspect of the effort to create easy-to-understand labels for Internet-of-Things (IoT) products is up in the air, according to participants in the process.

Cookies for MFA Bypass Gain Traction Among Cyberattackers

Multifactor authentication has gained adoption among organizations as a way of improving security over passwords alone, but increasing theft of browser cookies undermines that security.

Knock, Knock: Aiphone Bug Allows Cyberattackers to Literally Open (Physical) Doors

The bug affects several Aiphone GT models using NFC technology and allows malicious actors to potentially gain access to sensitive facilities.