Security
Headlines
HeadlinesLatestCVEs

Source

Threatpost

Zero-Trust For All: A Practical Guide

How to use zero-trust architecture effectively in today's modern cloud-dependent infrastructures.

Threatpost
Skeletons in the Closet: Security 101 Takes a Backseat to 0-days

Nate Warfield, CTO at Prevailion, discusses the dangers of focusing on zero-day security vulnerabilities, and how security teams are being distracted from the day-to-day work that prevents most breaches.

#vulnerability
Most Email Security Approaches Fail to Block Common Threats

A full 89 percent of organizations experienced one or more successful email breaches during the previous 12 months, translating into big-time costs.

Google: 2021 was a Banner Year for Exploited 0-Day Bugs

Last year, Google Project Zero tracked a record 58 exploited-in-the-wild zero-day security holes.

Rethinking Cyber-Defense Strategies in the Public-Cloud Age

Exploring what's next for public-cloud security, including top risks and how to implement better risk management.

‘CatalanGate’ Spyware Infections Tied to NSO Group

Citizen Lab uncovers multi-year campaign targeting autonomous region of Spain, called Catalonia.

Protect Your Executives’ Cybersecurity Amidst Global Cyberwar

In this time of unprecedented cyberwar, organizations must protect the personal digital lives of their executives in order to reduce the company’s risk of direct or collateral damage.

Cyberattackers Put the Pedal to the Medal: Podcast

Fortinet's Derek Manky discusses the exponential increase in the speed that attackers weaponize fresh vulnerabilities, where botnets and offensive automation fit in, and the ramifications for security teams.

Karakurt Ensnares Conti, Diavol Ransomware Groups in Its Web

Connections that show the cybercriminal teams are working together signal shifts in their respective tactics and an expansion of opportunities to target victims.

Feds: APTs Have Tools That Can Take Over Critical Infrastructure

Threat actors have developed custom modules to compromise various ICS devices as well as Windows workstations that pose an imminent threat, particularly to energy providers.