Security
Headlines
HeadlinesLatestCVEs

Source

DARKReading

Inside NIST's 4 Crypto Algorithms for a Post-Quantum World

With the world potentially less than a decade away from breaking current encryption around critical data, researchers weigh in on planning for the post-quantum world.

DARKReading
#git
Prevention Takes Priority Over Response

Cybersecurity teams continue to emphasize intrusion prevention over incident response, despite US government action.

North Korean State Actors Deploy Surgical Ransomware in Ongoing Cyberattacks on US Healthcare Orgs

US government warns healthcare and public-health organizations to expect continued attacks involving the manually operated "Maui" ransomware.

Apple Debuts Spyware Protection for State-Sponsored Cyberattacks

Apple's new Lockdown Mode protects devices targeted by sophisticated state-sponsored mercenary spyware attacks.

I Built a Cheap 'Warshipping' Device in Just 3 Hours — and So Can You

Here's how I did it and how you can protect your company against such physical/digital hybrid attacks.

Marriott Data Breach Exposes PII, Credit Cards

The hospitality giant said data from 300-400 individuals was compromised by a social-engineering scam targeting the Baltimore airport.

How to Keep EVs From Taking Down the Electrical Grid

They may be environmentally friendly, but the surging popularity of electric cars and plug-in hybrids puts the nation's electrical grid at greater risk for malfeasance.

Cloud Misconfig Exposes 3TB of Sensitive Airport Data in Amazon S3 Bucket: 'Lives at Stake'

The unsecured server exposed more than 1.5 million files, including airport worker ID photos and other PII, highlighting the ongoing cloud-security challenges worldwide.

Identity Access Management Is Set for Exploding Growth, Big Changes — Report

New research says IAM spending will grow on the back of affordable subscription services, spurred by cloud and mobile adoption, IoT, and continued remote working.

The Cyber-Asset Management Playbook for Supply Chain Modernization

Organizations must balance the risk and reward of new cyber-asset management technologies.