Security
Headlines
HeadlinesLatestCVEs

Source

DARKReading

New Report Examines Top Threats Discussed at Black Hat USA

Supply chain security and vulnerabilities in enterprise software were among the threats most dicussed at this year's show, survey data reveals.

DARKReading
Infrastructure, Security, and the Need for Visibility

Government authorities are increasingly trying to bolster critical infrastructure security. But investments in next-generation solutions won't go far enough without also addressing security and operational fundamentals.

Microsoft Warns of Uptick in MSHTML Attacks

Attackers leveraging the flaw are using infrastructure associated with other criminal groups, including ransomware-as-a-service operators, the company says.

HPE Survey Finds 76% of Doctors and Nurses Believe Telehealth Will Dominate Patient Care in Near Future

Findings are presented in HPE's "Future of Healthcare" Report, which surveyed healthcare clinicians and IT Decision Makers (ITDMs) in the United States and United Kingdom.

15% of the Nasdaq 100 Is Highly Susceptible to a Ransomware Attack, New Black Kite Research Finds

Black Kite’s Ransomware Susceptibility Index (RSI) determined that 1-in-7 Nasdaq-100 companies ranked as highly susceptible to a ransomware attack.

TransUnion to Buy Neustar for $3.1B

TransUnion, primarily known for credit ratings, hopes to expand into digital marketing and fraud mitigation capabilities with the deal.

FBI, CISA, CGCYBER Warn of APTs Targeting CVE-2021-40539

The critical authentication bypass vulnerability exists in Zoho ManageEngine ADSelfService Plus, officials report.

Grappling With Growth, Employee Needs, and Security Amid a Return to Offices

As organizations strive for a new version of business-as-usual, executives must prepare for challenges around infrastructure, varying guidelines, and balancing employee flexibility with office collaboration.

Under Pressure: COVID-19 Forced Many Execs to Sideline Cybersecurity

CISOs are more stressed, and the fallout is increased cyber-risk. Also, budget restrictions lead to a yawning chasm between need and funding.

How Attackers Invest in Cloud-Focused Cybercrime

A new study reveals an active underground market for access credentials to tens of thousands of cloud accounts and resources.