The UK MoD has failed to protect personally identifiable information (PII) for Afghan interpreters; the incident highlights how avoidable cybersecurity mistakes can have devastating consequences.
from Dark Reading: https://ift.tt/3ihCnCf
via IFTTT
The UK MoD has failed to protect personally identifiable information (PII) for Afghan interpreters; the incident highlights how avoidable cybersecurity mistakes can have devastating consequences.
from Dark Reading: https://ift.tt/3ihCnCf
via IFTTT
Wireless security protocols have improved, but product vendors continue to make implementation errors that allow a variety of attacks.
from Dark Reading: https://ift.tt/2VD4D9S
via IFTTT
New research suggests isolation among cloud customer accounts may not be a given — and the researchers behind the findings issue a call to action for cloud security.
from Dark Reading: https://ift.tt/37tSAy0
via IFTTT
Organizations that don’t implement end-to-end HTTP/2 are vulnerable to attacks that redirect users to malicious sites and other threats, security researcher reveals at Black Hat USA.
from Dark Reading: https://ift.tt/3jvBbKZ
via IFTTT
“We can’t do this alone,” the new CISA director told attendees in a keynote at Black Hat USA today.
from Dark Reading: https://ift.tt/3ysOUIW
via IFTTT
Mandiant experts discuss the novel techniques used to evade detection, automate data theft, and achieve persistent access.
from Dark Reading: https://ift.tt/37sdQUQ
via IFTTT
Attacks require executing code on a system but foil Apple’s approach to protecting private data and systems files.
from Dark Reading: https://ift.tt/3AeWMhD
via IFTTT
Researchers at Black Hat USA explain issues around defending “Golden Secrets” and present an approach to solving the problem.
from Dark Reading: https://ift.tt/3rVfR5u
via IFTTT
Security leaders are challenged to fill application security and cloud computing jobs in particular, survey data shows.
from Dark Reading: https://ift.tt/3CiZZOW
via IFTTT
In his keynote address at Black Hat USA on Wednesday, Matt Tait, chief operating officer at Corellium, called for software platform vendors and security researchers to do their part to thwart the fallout of software supply chain compromises.
from Dark Reading: https://ift.tt/3xqx8ET
via IFTTT