In Salt Typhoon’s Wake, Congress Mulls Potential Options – Dark Reading
While the House Committee on Government Reform was looking for retaliatory options, cybersecurity experts pointed them toward building better defenses. – Read More
While the House Committee on Government Reform was looking for retaliatory options, cybersecurity experts pointed them toward building better defenses. – Read More
Merchants and retailers will now face penalties for not being compliant with PCI DSS 4.0.1, and the increased security standards make it clear they cannot transfer compliance responsibility to third-party…
The US military and law enforcement learned to outthink insurgents. It’s time for cybersecurity to learn to outsmart and outmaneuver threat actors with the same framework. – Read More
Attackers target a familiar industry, law professionals, by hiding the infostealer in ads delivered via Google-based malvertising. – Read More
Transportation facilities and networks slowly adapt to changes and threats, leaving them vulnerable to agile cyberattackers, as demonstrated by the $10 million ransomware attack. – Read More
The new Google Workspace features will make it easier for enterprise customers to implement end-to-end encryption within Gmail. – Read More
A successful enterprise security defense requires a successful endpoint security effort. With options ranging from EDR, SIEM, SOAR, and more, how do security teams cut through the clutter and focus…
Over the past few weeks, bad actors from different regions have been scanning devices with the VPN for potential vulnerabilities. – Read More
In this roundtable, cybersecurity experts — including two former CISA executives — weigh in on alternate sources for threat intel, incident response, and other essential cybersecurity services. – Read More
The bill will allow Japan to implement safeguards and strategies that have been in use by other countries for some time. – Read More
The security vendor counters that none of the information came directly from its systems but rather was acquired over a period of time by targeting individuals. – Read More
The FDA’s regulations and guidance aim to strike a balance between ensuring rigorous oversight and enabling manufacturers to act swiftly when vulnerabilities are discovered. – Read More
Tenable released details of a Google Cloud Run flaw that prior to remediation allowed a threat actor to escalate privileges. – Read More
A continuation of the North Korean nation-state threat’s campaign against employment seekers uses the social engineering attack to target CeFi organizations with the GolangGhost backdoor. – Read More
New research from Specops Software shows attackers successfully attack and gain access to RDP with the most basic passwords. – Read More