Loading...
The day's top cybersecurity news and in-depth coverage
April 14, 2022
As sanctions hamper Russia's plans for AI dominance, it might turn up its cyber activities to hamper other countries' AI efforts. Read more â¶
What keeps security teams up at night when it comes to protecting their data? We asked hundreds of IT and Security leaders across a variety of organizations about their biggest data security concerns. Learn about the challenges they face - and what they can do to improve.
Sandworm succeeded in planting a new version of the Industroyer malware to disrupt ICS infrastructure at multiple levels, but was thwarted from doing serious damage.
Phishing simulations aren't enough for identifying your organizationâs most vulnerable insiders or minimizing their risk.
These static application security testing and dynamic application security testing tools can help developers spot code errors and vulnerabilities quicker.
The now patched JekyllBot:5 vulnerabilities in Aethon TUG robots expose three communications interfaces, two APIs, and a websocket interface.
Attackers are exploiting some 2FA settings to gain network access. Does your current configuration provide the best protection?
Palo Alto Unit 42 report highlights five threat groups targeting cloud infrastructure and reveals their credential-focused attack methods.
© 2024