Security
Headlines
HeadlinesLatestCVEs

Tag

#ibm

Deepfakes, Quantum Attacks Loom Over APAC in 2025

Organizations in the region should expect to see threat actors accelerate their use of AI tools and mount ongoing "harvest now, decrypt later" attacks for various malicious use cases.

DARKReading
#google#microsoft#js#alibaba#acer#auth#ibm
2024 in AI: It’s changed the world, but it’s not all good

An overview of incidents and news surrounding Artificial Intelligence in 2024.

The Importance of Empowering CFOs Against Cyber Threats

Working closely with CISOs, chief financial officers can become key players in protecting their organizations' critical assets and ensuring long-term financial stability.

To Defeat Cybercriminals, Understand How They Think

Getting inside the mind of a threat actor can help security pros understand how they operate and what they're looking for — in essence, what makes a soft target.

The Role of Blockchain and Smart Contracts in Securing Digital Transactions

Learn how blockchain and smart contracts improve cybersecurity factors in online transactions, remove the element of fraud, and…

Lessons From the Largest Software Supply Chain Incidents

The software supply chain is a growing target, and organizations need to take special care to safeguard it.

Ubuntu Security Notice USN-7092-2

Ubuntu Security Notice 7092-2 - USN-7092-1 fixed a vulnerability in mpg123. Bastien Roucariès discovered that the fix was incomplete on Ubuntu 20.04 LTS. This update fixes the problem. It was discovered that mpg123 incorrectly handled certain mp3 files. If a user or automated system were tricked into opening a specially crafted mp3 file, a remote attacker could use this issue to cause mpg123 to crash, resulting in a denial of service, or possibly execute arbitrary code.

Incident Response Playbooks: Are You Prepared?

The playbooks that accompany your incident response plan provide efficiency and consistency in responses, help reduce downtime and dwell time, and can be a cost-saving and reputational-saving measure for your organization.

Why Simulating Phishing Attacks Is the Best Way to Train Employees

Despite advancements in cybersecurity tools, human vulnerability remains the weakest link, with phishing among the most dangerous forms…