New Security Tools Target Growing macOS Threats – Dark Reading
A public dataset and platform-agnostic analysis tool aim to help organizations in the fight against Apple-targeted malware, which researchers say has lacked proper attention. – Read More
A public dataset and platform-agnostic analysis tool aim to help organizations in the fight against Apple-targeted malware, which researchers say has lacked proper attention. – Read More
A kitchen-sink approach to building containers has loaded many with vulnerabilities. A handful of companies are trying to slim them down. – Read More
A self-replicating attack led to a tidal wave of malicious packages in the NPM registry, targeting tokens for the tea.xyz protocol. – Read More
The North Korean threat actors behind the Contagious Interview campaign have once again tweaked their tactics by using JSON storage services to stage malicious payloads. “The threat actors have recently…
Sara Duffer highlights the top lessons she brought back to her security role following three years in Amazon’s shadow program. – Read More
Most enterprises use more than 1,000 apps, according to ESG research, yet about half are integrated with IGA. Industry innovations enable teams to expand app coverage and get more IGA…
Cybersecurity often feels like a race where you don’t know when the starting gun will fire. The moment a threat slips past the perimeter, the countdown begins. Every minute between…
In cybersecurity, time is scarce, talent is scarce, and certainty is scarce. That’s why efficiency has quietly become the most valuable currency inside the security operations center (SOC). Enterprise Strategy…
Every organization is chasing the same thing in security: speed, clarity, and confidence. But in reality, most are bogged down by complexity, siloed tools, and an overwhelming flood of alerts.…
Shadow IT is everywhere. What began with employees or departments bringing familiar tools such as personal email or file-sharing apps into the workplace has grown into unauthorized software-as-a-service (SaaS) platforms,…
The latest Stop! Think Fraud campaign provides practical advice to help individuals stay secure online – Read More
Arista Networks and Palo Alto Networks have extended their partnership to offer customers a framework for implementing zero-trust security inside the data center. The new framework is intended to offer…
Cybersecurity researchers have uncovered critical remote code execution vulnerabilities impacting major artificial intelligence (AI) inference engines, including those from Meta, Nvidia, Microsoft, and open-source PyTorch projects such as vLLM and…
The Iranian state-sponsored threat actor known as APT42 has been observed targeting individuals and organizations that are of interest to the Islamic Revolutionary Guard Corps (IRGC) as part of a…
Anthropic reported that a group of what it believes to be Chinese hackers carried out a series of attacks against foreign governments and large corporations in September. What makes the…