Attacked once, victimized multiple times: Data marketplaces are making it easier for threat actors to find and use data exfiltrated during ransomware attacks in follow-up attacks.
from Dark Reading https://ift.tt/mvY4ILj
via IFTTT
Attacked once, victimized multiple times: Data marketplaces are making it easier for threat actors to find and use data exfiltrated during ransomware attacks in follow-up attacks.
from Dark Reading https://ift.tt/mvY4ILj
via IFTTT
Attacked once, victimized multiple times: Data marketplaces are making it easier for threat actors to find and use data exfiltrated during ransomware attacks in follow-up attacks.
from Dark Reading https://ift.tt/mvY4ILj
via IFTTT
Duston Childs and Brian Gorenc of ZDI take the opportunity at Black Hat USA to break down the many vulnerability disclosure issues making patch prioritization a nightmare scenario for many orgs.
from Dark Reading https://ift.tt/kw3u7y4
via IFTTT
GitHub, the owner of the Node Package Manager (npm), proposes cryptographically linking source code and JavaScript packages in an effort to shore up supply chain security.
from Dark Reading https://ift.tt/gQVx36v
via IFTTT
Unusually, SOVA, which targets US users, now allows lateral movement for deeper data access. Version 5 adds an encryption capability.
from Dark Reading https://ift.tt/wOfuB5H
via IFTTT
Back-end complexity of cloud computing means there’s plenty of potential for security problems. Here’s how to get a better handle on SaaS application security.
from Dark Reading https://ift.tt/2gbtEmd
via IFTTT
The head of Microsoft’s Security Response Center defends keeping its initial vulnerability disclosures sparse — it is, she says, to protect customers.
from Dark Reading https://ift.tt/gVYlX8c
via IFTTT
During a keynote at Black Hat 2022, former CISA director Chris Krebs outlined the biggest risk areas for the public and private sectors for the next few years.
from Dark Reading https://ift.tt/bgwG4De
via IFTTT
In her keynote address at Black Hat USA 2022, Kim Zetter gives scathing rebuke of Colonial Pipeline attack.
from Dark Reading https://ift.tt/hg2uZx7
via IFTTT
Up-and-coming companies shoot their shot in a new feature introduced at the 25th annual cybersecurity conference.
from Dark Reading https://ift.tt/P38YHMr
via IFTTT