Google moves to keep public sector cybersecurity vulnerabilities leashed

Google made a recent move to secure state, local, tribal and territorial governments from cyber attacks. The post Google moves to keep public sector cybersecurity vulnerabilities leashed appeared first... Read more »

Incident response policy

PURPOSE Every enterprise needs to establish a plan of action to assess and then recover from unauthorized access to its network. This policy from TechRepublic Premium provides a foundation... Read more »

API security becoming C-level cybersecurity concern

With Neosec acquisition, Akamai gains capabilities around API visibility, a security challenge for organizations, many of which have hundreds of integrated applications. The post API security becoming C-level cybersecurity... Read more »

DevSecOps: AI is reshaping developer roles, but it’s not all smooth sailing

A report by GitLab finds that AI and ML in software development workflows show promise, but challenges like toolchain complexity and security concerns persist. The post DevSecOps: AI is... Read more »

Malware is proliferating, but defenses are stronger: Mandiant

As dwell times drop, and notifications of attack by third parties increase, organizations are getting better at defense while attackers evolve and malware proliferates. The post Malware is proliferating,... Read more »

Ransomware attacks increased 91% in March, as threat actors find new vulnerabilities

Ransomware attacks skyrocketed last month according to the new monthly cybersecurity report by NCC Group. New threat group Cl0p is behind the increase as it exploited vulnerabilities in GoAnywhere... Read more »

New DDoS attacks on Israel’s enterprises should be a wake-up call

Experts see the latest DDoS attacks against Israel as a case study in the effectiveness of simple, brute-force cybersecurity attacks, even against the most sophisticated targets. The post New... Read more »

How to create Portainer teams for restricted development access

Jack Wallen shows you how to create a team and add users in Portainer in a secure way. The post How to create Portainer teams for restricted development access... Read more »

Credential harvesting malware appears on deep web

New cloud-focused credential harvester available on encrypted messaging service Telegram is part of a trend of Python scrapers making it easier to bait multiple phishing hooks. The post Credential... Read more »

For cybercriminal mischief, it’s dark web vs deep web

A new report from cyberthreat intelligence company Cybersixgill sees threat actors swarming to digital bazaars to collaborate, buy and sell malware and credentials. The post For cybercriminal mischief, it’s... Read more »
Subscribe to our Newsletter