Loading...
The day's top cybersecurity news and in-depth coverage
March 04, 2023
The Biden administration's National Cybersecurity Strategy calls for more regulation on critical infrastructure providers and holds software providers accountable for their insecure products. Read more â¶
Although threat actors continue to use phishing, brand impersonation, and business email compromise (BEC) as common tactics, use of less familiar attack methods to infiltrate global organizations have picked up, Proofpoint says.
Digital ecosystems are big, complicated, and a massive vector for exploits and attackers. Santha Subramoni, global head, cybersecurity business unit at Tata Consultancy Services discusses digital ecosystems security and how businesses can lower risk within their digital ecosystems.
Researchers predict the APT will expand capabilities to target other platforms and apps in the future.
Avoid these simple mistakes when setting up OAuth for third-party authentication to block unauthorized account access.
The top five exploited vulnerabilities in 2022 include several high-severity flaws in Microsoft Exchange, Zoho ManageEngine products, and virtual private network solutions from Fortinet, Citrix and Pulse Secure.
© 2024