Cybersecurity News
Meet the Middlemen Who Connect Cybercriminals With Victims
An analysis of initial access brokers explains how they break into vulnerable organizations and sell their access for up to $10,000.09 September 2020
Chart: Does Lack of Diversity Impact the Skills Shortage?

09 September 2020
Inova Suffers Third-Party Data Breach
The breach occurred as part of a ransomware attack against service provider Blackbaud.09 September 2020
Zeppelin Ransomware Returns with New Trojan on Board

09 September 2020
Google Squashes Critical Android Media Framework Bug

09 September 2020
Our Diversity Program Isn't Working. What Are We Doing Wrong?

09 September 2020
Why We Need to Pay Attention to Attacks on the Smart-Built Environment
Are attacks on IoT physical security devices real or just theoretical? Why professionals need to be aware of the real-life examples in an effort to guard against future attacks on their own businesses.09 September 2020
BLURtooth vulnerability lets attackers overwrite Bluetooth authentication keys
All devices using the Bluetooth standard 4.0 through 5.0 are vulnerable. Patches not immediately available.09 September 2020
Secureworks to Buy Delve Laboratories for Vulnerability Management
Delve's automated vulnerability platform provides insight on high-risk vulnerabilities across an organization's network, endpoints, and cloud.09 September 2020
7 Cybersecurity Priorities for Government Agencies & Political Campaigns

09 September 2020
Cybersecurity 101: Protect your privacy from hackers, spies, and the government
Simple steps can make the difference between losing your online accounts or maintaining what is now a precious commodity: Your privacy.09 September 2020
TeamTNT Gains Full Remote Takeover of Cloud Instances

09 September 2020
Critical Flaws in 3rd-Party Code Allow Takeover of Industrial Control Systems

09 September 2020
Multiparty Encryption Allows Companies to Solve Security-Data Conundrum
An interdisciplinary research team constructs a way for companies to share breach data without revealing specific details that could exposes businesses to legal risk.09 September 2020
Top 5 Identity-Centric Security Imperatives for Newly Minted Remote Workers
In the wake of COVID-19, today's remote workforce is here to stay, at least for the foreseeable future. And with it, an increase in identity-related security incidents.09 September 2020
Spyware Labeled ‘TikTok Pro’ Exploits Fears of US Ban

09 September 2020
Weave Scope is now being exploited in attacks against cloud environments
The legitimate cloud infrastructure monitoring tool has been added to attacker arsenals.09 September 2020
Adobe Experience Manager, InDesign, Framemaker receive fixes for critical bugs in new update
The worst issues can lead to code and browser-based JavaScript execution.09 September 2020
Next-Gen Firewalls 101: Not Just a Buzzword

08 September 2020