Slándáil Research:
Feeds
Feeds
Search
Search Engine
Feed: Dark Reading News
Link
87% of Container Images in Production Have Critical or High-Severity Vulnerabilities
Student Medical Records Exposed After LAUSD Breach
Pirated Final Cut Pro for macOS Offers Stealth Malware Delivery
AUVSI Launches Green UAS Cybersecurity Certification Program For Commercial Drones
Forsage Founders Indicted in $340M DeFi Crypto Scheme
Cyberattack on Dole Causes Temporary Salad Shortage
Linux Foundation Europe Announces Formation of OpenWallet Foundation
UL Solutions Issues Automotive Cybersecurity Assurance Program Certificate to LG Innotek
Generative AI Changes Everything We Know About Cyberattacks
Hydrochasma Threat Group Bombards Targets with Slew of Commodity Malware, Tools
Hydrochasma Threat Group Bombards Targets With Slew of Commodity Malware, Tools
Unanswered Questions Cloud the Recent Targeting of an Asian Research Org
Wiper Malware Surges Ahead, Spiking 53% in 3 Months
Vault Vision Launches One Click Passwordless Logins With Passkey User Authentication
Cris Thomas: Space Rogue, From L0pht Hacker to IBM Security Influencer
Metomic Raises $20 Million to Protect Sensitive Data in SaaS Applications
Why Are My Employees Integrating With So Many Unsanctioned SaaS Apps?
Rezilion Research Discovers Hidden Vulnerabilities in Hundreds of Docker Container Images
(ISC)² Opens Security Congress 2023 Call for Presentations
Top Takeaways From CloudNativeSecurityCon 2023
This Will Be the Year of the SBOM, for Better or for Worse
UL Solutions Advances Automotive Safety and Security
Scammers Mimic ChatGPT to Steal Business Credentials
Half of Apps Have High-Risk Vulnerabilities Due to Open Source
Entitle Brings Fine-Grained Cloud Permissions Management Out of Stealth
1 in 4 CISOs Wants to Say Sayonara to Security
US Military Emails Exposed via Cloud Account
Headwinds Don't Have to Be a Drag on Your Security Effectiveness
Phishing Fears Ramp Up on Email, Collaboration Platforms
Google Delivers Record-Breaking $12M in Bug Bounties
Xcitium Brings 'Zero Dwell' Capability to Legacy EDR Platforms
Trend Micro Acquires SOC Technology Expert Anlyz
Exploit Code Released for Critical Fortinet RCE Bug
7 Tips for Mitigating Cyber-Risks to Your Corporate Social Media
4 Tips to Guard Against DDoS Attacks
How to Stop Attackers That Target Healthcare Imaging Data
Scrut Automation Raises Funding of $7.5M, Led by MassMutual Ventures, Lightspeed, and Endiya Partners
Black Hat to Launch Official Certification Program
CREST Calls for Greater Equity, Inclusion and Diversity As Part of National Cyber Security Strategy
Malwarebytes Expands Platform With New Application Block Capabilities
Analysts Slam Twitter's Decision to Disable SMS-Based 2FA
Cyberthreats, Regulations Mount for Financial Industry
Name That Toon: Join the Club
Coinbase Crypto Exchange Ensnared in 'Oktapus'-Related Smishing Attack
Third-Party Providers Create Identity and Access Control Challenges for Fintech Apps
Israel's Top Tech University Targeted by DarkBit Ransomware
Insider Threats Don't Mean Insiders Are Threatening
Modern Software: What's Really Inside?
Despite Breach, LastPass Demonstrates the Power of Password Management
Researchers Create an AI Cyber Defender That Reacts to Attackers
Majority of Ransomware Attacks Last Year Exploited Old Bugs
Is OWASP at Risk of Irrelevance?
Check Point Boosts AppSec Focus With CNAPP Enhancements
Novel Spy Group Targets Telecoms in 'Precision-Targeted' Cyberattacks
Google Translate Helps BEC Groups Scam Companies in Any Language
Inglis Retires as National Cyber Director Ahead of Biden's Cybersecurity EO
Not Stoked: Burton Snowboards' Online Orders Disrupted After Cyberattack
Massive GoAnywhere RCE Exploit: Everything You Need to Know
AppSec Threats Deserve Their Own Incident Response Plan
ESXi Ransomware Update Outfoxes CISA Recovery Script
Atlassian: Leaked Data Stolen via Third-Party App
SASE Market to Exceed Over $60B Between 2022 and 2027, According to Dell'Oro Group
MVP Vibe Fest Bridges Gap Between Athletics and Cybersecurity
WatchGuard Launches New Line of Firewall Products to Enhance Unified Security for Remote and Distributed Businesses
Cybersecurity Jobs Remain Secure Despite Recession Fears
SideWinder APT Spotted Stealing Crypto
SideWinder APT Spotted Targeting Crypto
Window Snyder's Start-up Launches Security Platform for IoT Device Makers
Window Snyder's Startup Launches Security Platform for IoT Device Makers
Simplify to Survive: How Organizations Can Navigate Cyber-Risk
Encrypted Traffic, Once Thought Safe, Now Responsible For Most Cyberthreats
Descope Handles Authentication So Developers Don't Have To
Oligo Security Takes Aim at Open Source Vulnerabilities
ChatGPT Subs In as Security Analyst, Hallucinates Only Occasionally
Brivo Reveals Top Security Trends for 2023: Convenience Is King in Securing the Hybrid Workplaces of the Future
Call for Speakers Now Open for the RH-ISAC Cyber Intelligence Summit
GAO Calls for Improved Data Privacy Protections
2023 Is the Year of Risk: 5 Ways to Prepare
3 Ways CISOs Can Lead Effectively and Avoid Burnout
What Purple Teams Wish Companies Knew
Build Cyber Resiliency With These Security Threat-Mitigation Considerations
IGEL Unveils COSMOS, the Unified End User Computing Platform for Secure, Managed Access to Any Cloud Workspace
Report Reveals Record-Breaking Year for Cyber Threats
5th State of CCPA, CPRA, and GDPR Compliance Report Shows More Than 90% of Companies Are Not Compliant
1898 & Co Launches New Cybersecurity Service for Critical Infrastructure
NIST's New Crypto Standard a Step Forward in IoT Security
How Security Teams Can Protect Employees Beyond Corporate Walls
Russian Cybercriminal Faces Decades in Prison for Hacking and Trading Operation
Infrastructure Risks Increase As IT and OT Converge
Expel Tackles Cloud Threats with MDR for Kubernetes
Expel Tackles Cloud Threats With MDR for Kubernetes
OT Network Security Myths Busted in a Pair of Hacks
9 New Microsoft Bugs to Patch Now
Oakland City Services Struggle to Recover From Ransomware Attack
Configuration Issues in SaltStack IT Tool Put Enterprises at Risk
Hospitals Sued for Using Meta's Ad-Tracking Code, Violating HIPAA
Why SecDataOps Is the Future of Your Security Program
Vaultree Appoints Technology Industry Veteran Rinki Sethi to Its Board of Directors
Cyber-Physical Systems Vulnerability Disclosures Reach Peak, While Disclosures by Internal Teams Increase 80% Over 18 Months
Ping Identity and Deloitte Forge Alliance to Give Organizations Advanced Identity and Access Solutions
ThreatConnect Closes 2022 with Accelerated Growth in Threat Intelligence Operations (TI Ops)
SynSaber Launches a Free OT PCAP Analyzer Tool for the Industrial Security Community
Lessons All Industries Can Learn From Automotive Security
Embattled VMware ESXi Hypervisor Flaw Exploitable in Myriad Ways
Dark Web Revenue Down Dramatically After Hydra's Demise
9 Scammers Busted for 5M Euro Phishing Fraud Ring
Accenture Acquires Morphus, Brazil-Based Cybersecurity Company
Healthcare in the Crosshairs of North Korean Cyber Operations
Russian Hackers Disrupt NATO Earthquake Relief Operations
What Happened to #OpRussia?
Reddit Hack Shows Limits of MFA, Strengths of Security Training
Trickbot Members Sanctioned for Pandemic-Era Ransomware Hits
Integreon Launches Cyber Incident Response Offering with Development of AI-Based Review and Integration of RadarFirst
MagicWeb Mystery Highlights Nobelium Attacker's Sophistication
Malicious Game Mods Target Dota 2 Game Users
Attacker Allure: A Look at the Super Bowl's Operational Cyber-Risks
Addressing the Elephant in the Room: Getting Developers & Security Teams to Work Together
Google Cloud Connects Chronicle to Health ISAC Feed
Reddit Breached With Stolen Employee Credentials
NewsPenguin Goes Phishing for Maritime & Military Secrets
4 Ways to Handle AI Decision-Making in Cybersecurity
Avast Threat Report: Consumers Plagued With Refund Fraud, Tech Support Scams, and Adware
7 Critical Cloud Threats Facing the Enterprise in 2023
SynSaber Releases ICS CVE Retrospective: 3 Years of CISA Advisories
Kaspersky Finds Growing Number of Parents Experiencing Ransomware Attacks on Children's Schools
Cryptographers Decode Secret Letters of Mary, Queen of Scots
Phishing Surges Ahead, as ChatGPT & AI Loom
NIST Picks IoT Standard for Small Electronics Cybersecurity
Twitter Implements API Paywall, but Will That Solve Its Enormous Bot Crisis?
Lessons From the Cold War: How Quality Trumps Quantity in Cybersecurity
How Do Playbooks Help CISOs Improve SecOps?
(ISC)² Makes Certified in Cybersecurity Exam Available in More Languages to Address Global Workforce Shortage
CISA Releases Recovery Script for Victims of ESXiArgs Ransomware
Jailbreak Trick Breaks ChatGPT Content Safeguards
Building Up IAM in a Multicloud World
Exclu Shutdown Underscores Outsized Role Messaging Apps Play in Cybercrime
ActZero Unveils Next-Generation MDR Platform
Leading Energy Companies Tap Fortress to Build and Operate Industry Repository to Identify and Remediate Critical Software Vulnerabilities
Skybox Security Appoints Cybersecurity Veteran Mordecai Rosen as CEO
SecuriThings Brings Managed Service Capabilities to Physical Security, With New Managed Service Platform
GAO Calls for Action to Protect Cybersecurity of Critical Energy, Communications Networks
Corelight Expands Partnership With CrowdStrike to Provide Network Detection and Response Technology for CrowdStrike Services
Almost Half of Executives Expect a Rise in Cyber Events Targeting Accounting and Financial Data in Year Ahead
Gigamon Exits NDR Market, Sells ThreatInsight Business to Fortinet
It Isn't Time to Worry About Quantum Computing Just Yet
Toyota Global Supply Chain Portal Flaw Put Hacker in the Driver's Seat
Why ChatGPT Isn't a Death Sentence for Cyber Defenders
In Perfect Harmony: Cybersecurity Regulation Harmonization
Why Some Cloud Services Vulnerabilities Are So Hard to Fix
How to Optimize Your Cyber Insurance Coverage
Cloud Apps Still Demand Way More Privileges Than They Use
'Money Lover' Finance App Exposes User Data
Fresh, Buggy Clop Ransomware Variant Targets Linux Systems
DPRK Using Unpatched Zimbra Devices to Spy on Researchers
New Banking Trojan Targeting 100M Pix Payment Platform Accounts
Industrial Cybersecurity Innovator Opscura Receives $9.4M in Series A Funding as Critical Operations Transform
Ongoing VMware ESXi Ransomware Attack Highlights Inherent Virtualization Risks
With TikTok Bans, the Time for Operational Governance Is Now
Backdoor in Dingo Cryptocurrency Allows Creator to Steal (Nearly) Everything
Coalfire Compliance Essentials Optimized for Automated Evidence Collection
ARMO Integrates ChatGPT to Help Users Secure Kubernetes
Intel 471 Announces Powerful and Scalable Attack Surface Protection Solution Suite
Infosec Launches New Office Comedy Themed Security Awareness Training Series
Financial Institutions Are Suffering From Increasingly Sophisticated Cyberattacks, According to Contrast Security
Valtix Survey: 95% of Organizations Say Multi-cloud Is a 'Strategic Priority' but Only 58% Have the Security Architecture to Support It
DataDome's Inaugural E-Commerce Holiday Bot & Online Fraud Report Reveals the U.S. as the Top Source of Bot Attacks
Optimizing Cybersecurity Investments in a Constrained Spending Environment
5 Ways to Survive Scam Season — or Rather, Tax Season
A Fool With a Tool Is Still a Fool: A Cyber Take
Keeping KillNet at Bay: Use the IP Address Blocklist
Consumer Watchdog Reports: CA Privacy Board OKs Landmark Personal Data Regulations, Some Key Protections Left Out
Crypto Drainers Are Ready to Ransack Investor Wallets
Global Ransomware Attack on VMware EXSi Hypervisors Continues to Spread
Cadien Cyber Response Launches to Deliver Incident Response & Complex Digital Forensics Services
Cybercrime Shows No Signs of Slowing Down
Patching & Passwords Lead the Problem Pack for Cyber-Teams
Name That Edge Toon: For the Birds
How Cybercriminals Are Operationalizing Money Laundering and What to Do About It
What CISOs Can Do About Brand Impersonation Scam Sites
Iran-Backed Actor Behind 'Holy Souls' Cyberattack on Charlie Hebdo, Microsoft Says
Scores of Redis Servers Infested by Sophisticated Custom-Built Malware
How the Cloud Is Shifting CISO Priorities
MITRE Releases Tool to Design Cyber Resilient Systems
MITRE Releases Tool to Design Cyber-Resilient Systems
Hornetsecurity Combats QR Code Phishing With Launch of New Technology
Korelock Launches IOT Smart Lock Technology Company
Cyberattack on Fintech Firm Disrupts Derivatives Trading Globally
6 Examples of the Evolution of a Scam Site
Rising ‘Firebrick Ostrich’ BEC Group Launches Industrial-Scale Cyberattacks
Rising 'Firebrick Ostrich' BEC Group Launches Industrial-Scale Cyberattacks
Patch Critical Bug Now: QNAP NAS Devices Ripe for the Slaughter
AppSec Playbook 2023: Study of 829M Attacks on 1,400 Websites
Managing the Governance Model for Software Development in a No-Code Ecosystem
Cybersecurity Leaders Launch First Attack Matrix for Software Supply Chain Security
ChatGPT May Already Be Used In Nation State Cyberattacks, Say IT Decision Makers in BlackBerry Global Research
Discrepancies Discovered in Vulnerability Severity Ratings
Lazarus Group Rises Again, to Gather Intelligence on Energy, Healthcare Firms
Why CISOs Should Care About Brand Impersonation Scam Sites
Nearly All Firms Have Ties With Breached Third Parties
CISA to Open Supply Chain Risk Management Office
Greater Incident Complexity, Shift in How Threat Actors Use Stolen Data, Will Drive the Cyber Threat Landscape in 2023, Says Beazley Report
Radiant Logic Signs Definitive Agreement to Acquire Brainwave GRC
Vista Equity Partners Completes Acquisition of KnowBe4
Inside Killnet: Pro-Russia Hacktivist Group's Support and Influence Grows
Beating the Odds: 3 Challenges Women Face in the Cybersecurity Industry
Gem Security Emerges From Stealth With $11M, Unveils Cloud TDIR Platform for Faster Response to Cloud Threats
Command-Injection Bug in Cisco Industrial Gear Opens Devices to Complete Takeover
Contrast Security Launches Alliance Program to Change the Way Customers Scale Their Security Solutions
Fortra's Terranova Security 2022 Gone Phishing Tournament Results Reveal Large Organizations at Highest Risk of Compromising Data
KnowBe4 to Offer $10,000 to Black Americans in Cybersecurity Scholarship
Application Security Must Be Nonnegotiable
ManageEngine Study Finds United States Enterprises Hit by Short-Staffed Security Operations Centers
Google Fi Users Caught Up in T-Mobile Breach
Checkmarx Launches Threat Intelligence for Open Source Packages
How Can Disrupting DNS Communications Thwart a Malware Attack?
Firmware Flaws Could Spell 'Lights Out' for Servers
Critical VMware RCE Vulnerabilities Targeted by Public Exploit Code
Phishers Trick Microsoft Into Granting Them 'Verified' Cloud Partner Status
Poser Hackers Impersonate LockBit in SMB Cyberattacks
Will Cybersecurity Remain Recession-Proof in 2023?
NanoLock Addresses Global Industrial & OT Cyber Demand with Expansions into Europe and North America
New Survey Reveals 40% of Companies Experienced a Data Leak in the Past Year
Aura and Nonprofit Cyversity Partner to Support a More Inclusive Cyber Workforce
Sentra Raises $30 Million Series A Financing to Meet Growing Demand for Data Security in the Cloud
Are Your Employees Thinking Critically About Their Online Behaviors?
Unleash the Full Potential of Zero-Trust Security
Predictions For Securing Today's Hybrid Workforce
Russia's Sandworm APT Launches Swarm of Wiper Attacks in Ukraine
SentinelOne and KPMG Announce Alliance To Accelerate Cyber Investigations and Response
Cybercrime Ecosystem Spawns Lucrative Underground Gig Economy
10M JD Sports Customers' Info Exposed in Data Breach
IT and Security Professionals Spend an Average of 4,300 Hours Annually Achieving or Maintaining Compliance
The Threat from Within: 71% of Business Leaders Surveyed Think Next Cybersecurity Breach Will Come from the Inside
Make Developers the Driver of Software Security Excellence
How $6 Can Buy Hacked Social Media & Streaming Accounts From the Dark Web, Whizcase Study Reveals
Facebook Bug Allows 2FA Bypass Via Instagram
Fake Texts From the Boss, Bogus Job Postings and Frankenstein Shoppers — Oh My!
Convincing, Malicious Google Ads Look to Lift Password Manager Logins
Long Con Impersonates Financial Advisers to Target Victims
The Journal, Artificial Intelligence in the Life Sciences, Highlights the Contributions of Women in Artificial Intelligence in the Life Sciences
Spotlight on 2023 DevSecOps Trends
Enterprises Don't Know What to Buy for Responsible AI
Enterprises Need to Do More to Assure Consumers About Privacy
Why Most Companies Still Don’t Know What’s on Their Network
On Data Privacy Day, Organizations Fail Data Privacy Expectations
Critical RCE Lexmark Printer Bug Has Public Exploit
Google: Influence Operator Dragonbridge Floods Social Media in Sprawling Cyber Campaign
How Noob Website Hackers Can Become Persistent Threats
3 Ways ChatGPT Will Change Infosec in 2023
Riot Games Latest Video-Game Maker to Suffer Breach