Advertisement
More top stories
Splashtop teams with Acronis for remote security support
Scalable offering claims to allow security-focused technicians to troubleshoot problems without leaving Acronis console.
Revelstoke’s SOAR to improve case management with replicable sub-workflows
The company’s Case Automation Security Execution (CASE) management platform will use its in-house unified data layer (UDL) to develop and deploy automated, logic-based, sub-workflows for replication.
Apple Holic
Apple slaps hard against ‘mercenary’ surveillance-as-a-service industry
The company is introducing Lockdown Mode to protect high-risk individuals against corrosive surveillance and attacks, and investing millions to improve protection on its devices.
Advertisement
U.S. and UK warn local governments, businesses of China's influence operations
China uses personal, business and political relationships to gather information and influence actions. U.S. and UK government agencies urge caution.
Cybersecurity Snippets
5 things security pros want from XDR platforms
New research shows that while extended detection and response (XDR) remains a nebulous topic, security pros know what they want from an XDR platform.
How the US DHS develops hard-to-find cybersecurity skills
The Department of Homeland Security's Amanda Conley tells how she finds and uplevels specialized and expensive cybersecurity talent on a government budget.
Attacker groups adopt new penetration testing tool Brute Ratel
APT group's use of a legitimate pen-testing tool gives them stealth capabilities, allowing them to avoid detection by EDR and antivirus tools.
Smart factories unprepared for cyberattacks
Smart factory operators are well aware of the cyberthreats they face but acknowledge lack of readiness to defend against them.
An updated pipeline security directive is underway, reflecting TSA struggles
The TSA directives issued after the Colonial Pipeline attack have been widely criticized, but the agency is working with the industry to improve them.
NIST names new post-quantum cryptography standards
One public-key encryption and three digital signature algorithms determined to provide the best defense against quantum attacks.
Advertisement
What is decentralized identity?
Decentralized identity, also referred to as self-sovereign identity, is a model for identity management that gives individuals control over their own data. It is a concept that almost certainly will play a role in digital identity...
How to keep attackers from using PowerShell against you
New guidance shows how to harden PowerShell and make it more difficult for threat actors to hijack for malicious purposes.
APT campaign targeting SOHO routers highlights risks to remote workers
The ZuoRAT remote access Trojan malware can compromise multiple router brands and likely has been active for years.
SQL injection, XSS vulnerabilities continue to plague organizations
Errors that allow SQL injection and cross-site scripting attacks are still the top vulnerabilities that pen-testers find, especially at smaller companies.
LockBit explained: How it has become the most popular ransomware
Criminal use of the LockBit ransomware as a service is growing rapidly thanks to updates to the malware and the decline of other ransomware gangs.
From Our Advertisers
-
Featured Sponsor HP Wolf SecurityThe Need for Endpoint Security Rooted In Zero Trust
-
Sponsored by Microsoft Security5 Attack Elements Organizations Should Monitor: Anatomy of an External Attack
-
Sponsored by FortinetAdvancing Cybersecurity Skillsets Helps Organizations Against Threats
-
Sponsored by CrowdStrikeSo You Want To Defend Your Cloud… Agentless or Agent-based, Which Approach Is