A remote code execution vulnerability in Log4j presents a bigger threat to organizations than even the infamous 2017 Apache Struts vulnerability that felled Equifax, they say.
from Dark Reading https://ift.tt/30gBcx1
via IFTTT
A remote code execution vulnerability in Log4j presents a bigger threat to organizations than even the infamous 2017 Apache Struts vulnerability that felled Equifax, they say.
from Dark Reading https://ift.tt/30gBcx1
via IFTTT
Oleg Koshkin was sentenced for running a crypting service used to hide the Kelihos malware from antivirus software.
from Dark Reading https://ift.tt/3ENWsJi
via IFTTT
With more staff working remotely, identity, authentication, and access (IAA) has never been more important. Market forecasts, drivers and trends are explored.
from Dark Reading https://ift.tt/3IE24Z7
via IFTTT
The Dark Reading editorial team, along with contributing writers and editors, share their favorite stories and memories of co-founder and editor-in-chief Tim Wilson, an influential editor and well-respected thought leader in the cybersecurity industry.
from Dark Reading https://ift.tt/3DD6xHO
via IFTTT
Exploring ransomware and other data integrity risks from accelerated digital transformation in the wake of COVID-19.
from Dark Reading https://ift.tt/3dCKwhN
via IFTTT
RLBox can be used to protect web browsers and other software applications from vulnerabilities in subcomponents and libraries.
from Dark Reading https://ift.tt/336h2Xp
via IFTTT
Penetration audits can be dangerous for people of color. Here is how to keep Black and brown cybersecurity professionals safe during red team engagements.
from Dark Reading https://ift.tt/3rRaIxt
via IFTTT
The authorization is effective until December 31, 2022.
from Dark Reading https://ift.tt/3GtgglM
via IFTTT
Volume of traffic associated with the malware is now back at 50% of the volume before law enforcement took the botnet operation down in January 2021, security vendor says.
from Dark Reading https://ift.tt/3lQLQC0
via IFTTT
Outlook features intended to improve collaboration and productivity may make social engineering attacks more effective, researchers find.
from Dark Reading https://ift.tt/31JpMm6
via IFTTT