Laden...
The day's top cybersecurity news and in-depth coverage
February 14, 2022
The new guidance aims to tighten security requirements for federally purchased software and give consumers better insight into the security of software and devices they buy. Read more â¶
The days of smash-and-grab cyberattacks are over. Instead, headline-making hits on Acer, JBS Foods, and Colonial Pipeline make it clear: We've entered a new, more sophisticated modern era of ransomware tactics.
Blacks in Cybersecurity offers a âspinning wheel of resourcesâ to help its members advance their cybersecurity skills and careers, says founder and CEO Michaela Barnett.
The high-severity vulnerabilities that CISA has added to its patch-now list include SeriousSAM privilege escalation and SMB remote code execution.
Focusing on talent, technology, culture and leadership, the summit, held virtually February 15-17, will feature speakers from major companies, consultancies, and academia to help IT leaders navigate their way through the complexities of a vastly changed corporate landscape.
SAP ICM vulnerability allows theft of credentials and session information, which can be used to launch ransomware and steal sensitive data.
Magnet's new application, Automate Enterprise, is designed to speed up investigation and response to cybersecurity incidents by automating basic and repetitive manual tasks, and integrating detection and post-incident tools including SIEM and EDR software.
Mobile security often beats PCs, but users can still be fooled and smartphones can still be hacked. Hereâs what you need to watch for.
© 2024