[*] [+] [-] [x] [A+] [a-]  
[l] at 5/26/23 3:03pm
Improving the security of open source repositories and keeping malicious components out requires a combination of technology and people.

[Link to media]

[*] [+] [-] [x] [A+] [a-]  
[l] at 5/26/23 1:47pm
No more information available.
[*] [+] [-] [x] [A+] [a-]  
[l] at 5/26/23 11:32am
Informants have released data that includes thousands of safety complaints the company has received about its self-driving capability, as well as sensitive information regarding current and past employees.

[Link to media]

[*] [+] [-] [x] [A+] [a-]  
[l] at 5/26/23 10:45am
Phishing campaigns targeting travelers have evolved from simple, easy-to-spot fraud attempts to highly sophisticated operations.

[Link to media]

[*] [+] [-] [x] [A+] [a-]  
[l] at 5/26/23 8:00am
To mitigate risk, both developers and users must include security principles and technologies as core foundations in new devices.

[Link to media]

[*] [+] [-] [x] [A+] [a-]  
[l] at 5/25/23 6:15pm
Ukraine's head of cybersecurity Victor Zhora says the world needs "efficient legal instruments to confront cyber terrorism."

[Link to media]

[*] [+] [-] [x] [A+] [a-]  
[l] at 5/25/23 3:53pm
This is the first incident where a threat actor from the country appears to be laying the groundwork for disruptive attacks in the future, researchers say.

[Link to media]

[*] [+] [-] [x] [A+] [a-]  
[l] at 5/25/23 3:50pm
The new Red Hat Trusted Software Supply Chain services help developers take a secure-by-design approach to build, deploy, and monitor software.

[Link to media]

[*] [+] [-] [x] [A+] [a-]  
[l] at 5/25/23 3:30pm
Russian code that could tamper with industrial machines and toggle RTUs on and off was floating around VirusTotal for years before being noticed. It raises new questions about the state of OT security.

[Link to media]

[*] [+] [-] [x] [A+] [a-]  
[l] at 5/25/23 3:18pm
The infamous North Korean APT group is using Log4Shell, the 3CX supply chain attack, and other known vectors to breach Microsoft Web servers.

[Link to media]

[*] [+] [-] [x] [A+] [a-]  
[l] at 5/25/23 2:52pm
The streaming giant is looking to bolster flagging subscription growth and profits, but security researchers say the move offers a perfect opportunity to encourage better password hygiene and account safety.

[Link to media]

[*] [+] [-] [x] [A+] [a-]  
[l] at 5/25/23 1:48pm
Perception Point's 2023 Annual Report: Cybersecurity Trends & Insights' analyzes the most prevalent cyberattack trends amidst today's complex threat landscape, identifying an overall increase of 87% in the total number of attacks over the course of last year.
[*] [+] [-] [x] [A+] [a-]  
[l] at 5/25/23 1:24pm
No more information available.
[*] [+] [-] [x] [A+] [a-]  
[l] at 5/25/23 11:24am
Bank of Ghana's security operations center will boost visibility into threats and enable threat intelligence sharing, it says.

[Link to media]

[*] [+] [-] [x] [A+] [a-]  
[l] at 5/25/23 8:56am
A campaign against customers of Portuguese banks uses a capable financial malware strain dubbed PeepingTitle, written in the Delphi programming language.

[Link to media]

[*] [+] [-] [x] [A+] [a-]  
[l] at 5/25/23 8:56am
A campaign against customers of Portuguese banks uses a capable financial malware strain dubbed PeepingTitle, written in the Delphi programming language.

[Link to media]

[*] [+] [-] [x] [A+] [a-]  
[l] at 5/25/23 8:18am
Researchers could access sensitive data and steal secrets by exploiting a vulnerability in GCP's security layer, eventually running rampant in the environment.

[Link to media]

[*] [+] [-] [x] [A+] [a-]  
[l] at 5/25/23 8:00am
Organizations must be cautious about how they interact with other regions around the world in order to operate safely in an at-times adversarial landscape.

[Link to media]

[*] [+] [-] [x] [A+] [a-]  
[l] at 5/25/23 7:00am
in the wake of the ex-Uber CISO verdict, CISOs ask for clearer rules and less uncertainty in managing disclosures, amid jail-time fears.

[Link to media]

[*] [+] [-] [x] [A+] [a-]  
[l] at 5/24/23 4:09pm
According to Microsoft and researchers, the state-sponsored threat actor could very well be setting up a contingency plan for disruptive attacks on the US in the wake of an armed conflict in the South China Sea.

[Link to media]

[*] [+] [-] [x] [A+] [a-]  
[l] at 5/24/23 3:52pm
The new software-led solution enables organizations to defend against cybersecurity threats in their operational technology (OT) environments.
[*] [-] [-] [x] [A+] [a-]  
[l] at 5/24/23 10:30am
Researchers say the Iranian nation-state actor known as Tortoiseshell could be behind the attacks.

[Link to media]

[*] [+] [-] [x] [A+] [a-]  
[l] at 5/24/23 8:00am
Any new cybersecurity technology should be not just a neutral addition to a security stack but a benefit to the other technologies or people managing them.

[Link to media]

As of 5/28/23 6:50pm. Last new 5/26/23 2:53pm.

Next feed in category: Tech News World