Cloud SecurityInherent disadvantage: Why hackers have the upper hand in the cloudPaul WagenseilAugust 7, 2024Defenders lose the home-field advantage when they're protecting cloud assets and SaaS platforms, two researchers said at the BSides Las Vegas 2024 security conference.
Network SecurityMost companies are afraid of unseen cybersecurity threatsShaun NicholsAugust 6, 2024Companies are by and large afraid of the threat posed by unknown threat actors and exploits.
Vulnerability ManagementGoogle patches 46 Android bugs, including exploited kernel flawLaura FrenchAugust 6, 2024CVE-2024-36971 could enable remote code execution due to a use-after-free error.
RansomwareSharpRhino RAT tied to Hunters International ransomware gangSteve ZurierAugust 6, 2024Security pros say the Hunters International ransomware group has been targeting IT workers, although not in any specific vertical sector.
RansomwareProton ransomware continues evolution with latest Zola variantLaura FrenchAugust 5, 2024The ransomware includes a disk overwrite loop and a keyboard language-based kill switch.
Vulnerability Management1 in 5 companies say state-sponsored attacks try to penetrate supply chainShaun NicholsAugust 5, 2024Roughly one fifth of enterprise IT administrators have found themselves the target of a state-sponsored attack.
Vulnerability ManagementLinux kernel exploitation SLUBStick can read and write memory arbitrarilySteve ZurierAugust 5, 2024Researchers from Graz University of Technology showed how the vulnerability worked across nine CVEs.
Critical Infrastructure SecurityUkraine steps up cyberwar with DDoS on Russian banksShaun NicholsAugust 2, 2024Officials in Ukraine say they have concluded a week-long attack intended to hinder the financial system in Russia.
RansomwareRhysida auctions Columbus data after city halts ransomware encryptionLaura FrenchAugust 2, 2024The ransomware gang claims to have 6.5 TB of data on city employees and emergency services.
Application securityAttackers exploit StackExchange to load malicious packages to PyPISteve ZurierAugust 2, 2024Checkmarx researchers say the infostealer malware exfiltrated sensitive data and drained the crypto wallets of developers.
TikTok Lawsuit shows that app developers are responsible for protecting the privacy of minorsDustin SachsAugust 5, 2024
Navigating the GRC landscape: Insights from Mark Weatherford, former deputy under secretary for cybersecurityBill BrennerAugust 5, 2024