'Gold Melody' Access Broker Plays on Unpatched Servers' Strings A financially motivated threat actor uses known vulnerabilities, ordinary TTPs, and off-the-shelf tools to exploit the unprepared, highlighting the fact that many organizations still don't focus on the security basics.
Do CISOs Have to Report Security Flaws to the SEC? The new SEC rules make it seem that there is no need to report the presence of security vulnerabilities, but that doesn't quite tell the full story.
LATEST FROM DR TECHNOLOGY
ASPM Is Good, but It's Not a Cure-All for App Security What application security posture management does, it does well. But you'll still need to fill in some holes, especially concerning API security.
Bot Swarm: Attacks From Middle East & Africa Are Notably Up Most automated attacks from the regions were against e-commerce and telecommunications organizations.