Security
Headlines
HeadlinesLatestCVEs

Source

DARKReading

Ransomware Operators Ramp Up Pressure on Victims via Multiple Extortion Attacks

Though overall ransomware attack volumes dipped in the first half of this year, the number of campaigns involving three and four extortion methods increased.

DARKReading
Name That Toon: Congrats! It's a ...

Feeling creative? Submit your caption and our panel of experts will reward the winner with a $25 Amazon gift card.

Reported Rates of Major Security Incidents by Market

In the "Proven Success Factors for Endpoint Security" report, Cisco Security shares a global perspective on reported cyber events in the past two years.

Google Patches Chrome Bugs Exploited in the Wild

CISA advises organizations to patch quickly to protect against zero-day exploits.

Outlining Risks to the World's Vital Cyber-Physical Systems

The key to protecting these systems is not only to ensure the control environment is secure and protected but also to deploy emerging technologies such as confidential computing.

Nearly 50% of On-Premises Databases Have Vulnerabilities

A network compromise shouldn't mean "game over" for corporate data, but survey data shows many companies fail to protect their crown jewels.

DHS Secretary Mayorkas Headlines Billington Cybersecurity Summit

DHS Secretary Mayorkas joins 130+ cyber experts at Billington Cybersecurity Summit that explores ransomware, 5G, zero trust, and more.

Magecart: How Its Attack Techniques Evolved

Shape-shifting Magecart has shown itself to be highly adaptable in its ability to compromise third-party websites, especially during the pandemic.

Security Fears & Remote Work Drive Continued 2FA Adoption

Seventy-nine percent of people used two-factor authentication at least once in 2021, with 72% regularly using the technology, as remote work, social media, and online retail spur demand.

Brute-Force Attacks, Vulnerability Exploits Top Initial Attack Vectors

A new analysis emphasizes how most security incidents can be avoided with strong patch management and password management policies.