Security
Headlines
HeadlinesLatestCVEs

Source

DARKReading

How to Find New Attack Primitives in Microsoft Azure

Abuse primitives have a longer shelf life than bugs and zero-days and are cheaper to maintain. They're also much harder for defenders to detect and block.

DARKReading
#web#google#microsoft#git#intel#auth#zero_day#chrome
New Vulnerability Database Catalogs Cloud Security Issues

Researchers have created a new community website for reporting and tracking security issues in cloud platforms and services — plus fixes for them where available.

NIST Finalizes macOS Security Guidance

NIST SP800-219 introduces the macOS Security Compliance Project (mSCP) to assist organizations with creating security baselines and defining controls to protect macOS endpoints.

Federal, State Agencies' Aid Programs Face Synthetic Identity Fraud

Balancing public service with fraud prevention requires rule revisions and public trust.

LockBit 3.0 Debuts With Ransomware Bug Bounty Program

LockBit 3.0 promises to 'Make Ransomware Great Again!' with a side of cybercrime crowdsourcing.

Shadow IT Spurs 1 in 3 Cyberattacks

Cerby platform emerges from stealth mode to let users automate security for applications outside of the standard IT purview.

Thrive Acquires DSM

DSM is now the third acquisition by Thrive in Florida in the past six months.

It's a Race to Secure the Software Supply Chain — Have You Already Stumbled?

If you haven't properly addressed the issue, you're already behind. But even if you've had a false start, it's never too late to get back up.

Threat Intelligence Services Are Universally Valued by IT Staff

Most of those surveyed are concerned about AI-based attacks and deepfakes, but suggest that their organization is ready.

Why We're Getting Vulnerability Management Wrong

Security is wasting time and resources patching low or no risk bugs. In this post, we examine why security practitioners need to rethink vulnerability management.