Security
Headlines
HeadlinesLatestCVEs

Source

DARKReading

Airborne Drones Are Dropping Cyber-Spy Exploits in the Wild

Drone-based cyberattacks to spy on corporate targets are no longer hypothetical, one incident from this summer shows.

DARKReading
#vulnerability#apple#wifi
Key Takeaways From Omdia's IGA Market Radar

Identity governance administration (IGA) started life as a tool for organizations to meet a sudden surge of legal and regulatory requirements, but it has grown into a key enabler of security.

Cyolo Receives Investment from IBM Ventures for Zero Trust Secure Access Platform

The investment by IBM Ventures enables further collaboration to accelerate the adoption of modernized, identity-based connectivity for today's digital organizations.

Android Leaks Wi-Fi Traffic Even When VPN Protection Features Are On

The platform lets network connectivity data escape outside of the secure tunnel when connected to a public network, posing a "privacy concern" for users with "certain threat models," researchers said.

5 Signs That It's Time to Invest in Data Loss Prevention

Automation means more attacks. It also means smarter, easier-to-implement prevention techniques. Here are five signs it is time to put your own data loss prevention strategy into place.

Beachhead Solutions Adds Windows Security Management to the BeachheadSecure® Platform

Included at no added cost, BeachheadSecure now provides accountwide management of Microsoft Defender AV, Firewall, and Controlled Folders for the most complete PC and device security available.

Refund Fraud-as-a-Service Ads on Hacker Forums Increase by 60%

Research from Netacea reveals that as of September 2022, there are over 1,600 professional refund service adverts on hacker forums.

Vectra Advances Security AI to Deliver Attack Signal Intelligence™, Empowering Security Teams to Investigate and Respond to Attacks in Real Time

Security AI-driven Attack Signal Intelligence automates cyber threat detection, triage, and prioritization across public cloud, SaaS, identity and networks.

Cloud Data Breaches Are Running Rampant. What Are the Common Characteristics?

Protecting against data breaches requires detailed analysis of recent attacks for remediation and prevention.