Laden...
The day's top cybersecurity news and in-depth coverage
February 15, 2022
Recent cyber attacks against Western entities operating in Ukraine aim to disrupt or conduct espionage. CISOs should be wary of such attacks expanding beyond the Ukrainian border. Read more â¶
Survey finds significant jump in software supply chain attacks after Log4j exposed.
Malware, short for malicious software, is a blanket term for viruses, worms, trojans and other harmful computer programs attackers use to wreak destruction and gain access to sensitive information. Hereâs what you need to know.
SAP ICM vulnerability allows theft of credentials and session information, which can be used to launch ransomware and steal sensitive data.
The new guidance aims to tighten security requirements for federally purchased software and give consumers better insight into the security of software and devices they buy.
The high-severity vulnerabilities that CISA has added to its patch-now list include SeriousSAM privilege escalation and SMB remote code execution.
Is that security trend hot or not? From tools and technologies to threats and tactics, the numbers don't lie.
© 2024