Security
Headlines
HeadlinesLatestCVEs

Source

DARKReading

Phishing Attack Blends Spoofed Amazon Order and Fraudulent Customer Service Agents

It's the latest in a series of clever brand impersonation scams that use multiple vectors to lure victims.

DARKReading
#amazon
Appsian Security Announces Acquisition of Q Software, a Leader in JD Edwards Security and Compliance

The acquisition provides customers of JD Edwards, along with Oracle EBS and Oracle Cloud, with expanded capabilities for data masking, threat detection and response, and real-time analytics across multiple ERP applications.

How to Avoid Another Let's Encrypt-Like Meltdown

Experts weigh in on steps network and security administrators need to take before the next time a root certificate expires.

Having Trouble Finding Cybersecurity Talent? You Might Be the Problem

Hiring managers must rethink old-school practices to find the right candidates and be ready to engage in meaningful conversations about their company's values. Here are three ways to start.

How to Avoid Another Let's Encrypt-Like Meltdown

Experts weigh in on steps network and security administrators need to take before the next time a root certificate expires.

How to Avoid Another Let's Encrypt-Like Meltdown

Experts weigh in on steps network and security administrators need to take before the next time a root certificate expires.

Researchers Scan the Web to Uncover Malware Infections

Dozens of companies and universities regularly scan the Internet to gather data on connected devices, but some firms are looking deeper to uncover the extent of detectable malware infections.

CISA Issues New Directive for Patching Known Exploited Vulnerabilities

The goal is to reduce civilian federal agency exposure to attacks that threat actors are actively using in campaigns, agency says.

5 MITRE ATT&CK Tactics Most Frequently Detected by Cisco Secure Firewalls

Cisco Security examines the most frequently encountered MITRE ATT&CK tactics and techniques.