Advertisement

zeroday software bug skull and crossbones security flaw exploited danger vulnerabilities by gwengoa

Why more zero-day vulnerabilities are being found in the wild

With the number of zero-days spiking in the last 18 months, organizations need to increase their patching efforts. Software vendors can be more transparent, too.


a hooded figure targets a coding vulnerability

How and why threat actors target Microsoft Active Directory

New vulnerabilities in Active Directory emerge regularly, and unpatched old ones and misconfigurations open doors for attackers.


DDOS attack

Russian DDoS attack on Lithuania was planned on Telegram, Flashpoint says

Russian cybercollective Killnet dropped evidence of possible collaboration with ransomware gang Conti in its hacking campaign against Lithuania on a Telegram channel, security company Flashpoint reports.


Advertisement

Cyber warfare  >  Russian missile launcher / Russian flag / binary code

Microsoft's Defending Ukraine report offers fresh details on digital conflict and disinformation

Russia will use what it learned from its destructive cyber actions in Ukraine for other operations. "There is no going back to normal."


A group of anonymous hooded figures exist amid raining streams of binary code. [security threats]

Russia-China cybercriminal collaboration could “destabilize” international order

Russian cybercrime groups are courting their Chinese counterparts potentially could scale up the capabilities of both.


binary neural network - artificial intelligence - machine learning

Adversarial machine learning explained: How attackers disrupt AI and ML systems

Threat actors have several ways to fool or exploit artificial intelligence and machine learning systems and models, but you can defend against their tactics.


Dustin White, chief risk data officer, Visa

How Visa fights fraud

The financial services company has made massive investments in data and analytics to better detect and prevent fraud.


security monitoring

Security startup Cerby debuts with platform to manage shadow IT

The Cerby system automates and streamlines the detection and protection of "unmanageable" applications, providing a platform that centralizes application enrollment, access and monitoring.


ransomware breach hackers dark web

5 years after NotPetya: Lessons learned

NotPetya vastly broadened the scope of damage that malware attacks could do and forced CISOs and security researchers to rethink their approach.


Double-exposure of a city and a businessman's silhouette containing the shadow of a strongman.

The strange business of cybercrime

How modern cybercrime syndicates adopt the ways of enterprise business, reaping the gains and suffering the difficulties.


Advertisement

Impersonation / disguise / fraud / false identity / identity theft

Mitek launches MiVIP platform to fight identity theft

The Mitek Verified Identity Platform can leverage multiple authentication technologies to provide security across the transaction lifecycle.


spyware alert notification

Italian spyware firm is hacking into iOS and Android devices, Google says

RCS Lab spyware uses known exploits to install harmful payloads and steal private user data, according to a Google report.


A hand controls a small marionette. [control / manipulation / social engineering]

5 social engineering assumptions that are wrong

Cybercriminals continue to launch creative social engineering attacks to trick users. Meanwhile, social engineering misconceptions are exacerbating the risks of falling victim.


rocket launch startup cloud success growth badge

Security startups to watch for 2022

Security startups are often innovation leaders. These are some of the most interesting ones to watch as they tackle issues around cloud security, asset management and more.


noops code developer devops html web developer by mazimusnd getty

Open-source software risks persist, according to new reports

Companies are still struggling to gain confidence in the security of their open-source projects, but shifting security earlier in the development process shows promise.