cybersecurity news
-
Threat Intelligence
Attackers Crafted Custom Malware for Fortinet Zero-Day
Researchers analyzing data associated with a recently disclosed zero-day vulnerability in Fortinet’s FortiOS SSL-VPN technology have identified a sophisticated new…
-
Threat Intelligence
Cybercriminals Target Telecom Provider Networks
The growing use of mobile devices for multifactor authentication increasingly has made telecom providers a juicy target for cybercrime. An…
-
Threat Intelligence
Name That Toon: Poker Hand
New year, new cartoon contest! We’re flushed with excitement, knowing our clever, cybersecurity-minded readers are going to come up with…
-
Threat Intelligence
New Coalfire Report Reveals CISOs Rising Influence
WESTMINSTER, Colo., Jan. 18, 2023 /PRNewswire/ — In partnership with the world-class Dark Reading research team, global cybersecurity pioneer Coalfire today unveiled its second…
-
Threat Intelligence
ChatGPT Could Create Polymorphic Malware Wave, Researchers Warn
The newly released ChatGPT artificial intelligence bot from OpenAI could be used to usher in a new dangerous wave of…
-
Threat Intelligence
Initial Access Broker Market Booms, Posing Growing Threat to Enterprises
Names such as Novelli, orangecake, Pirat-Networks, SubComandanteVPN, and zirochka are unlikely to mean anything to a vast majority of enterprise…
-
Cloud Security
Crawl, Walk, Run: Operationalizing Your IaC Security Program
You’ve decided to shift your cloud security left. You researched vendors, evaluated solutions, did a proof of concept and now…
-
Cloud Security
How To Prevent the IaC Misconfiguration Snowball Effect
The goal with infrastructure as code (IaC) frameworks such as Terraform and CloudFormation is to make infrastructure provisioning more efficient.…
-
Cloud Security
Prevent Secret Leaks: Find and Secure Secrets Across Your Repositories and Pipelines
Developers use secrets to enable their applications to securely communicate with other services. Hardcoding credentials (like usernames and passwords) simplifies…
-
Cloud Security
You Must Comply! Why You Need Proactive Open-Source License Compliance
As vulnerabilities in open-source code continue to play a prominent role in headline-grabbing exploits, such as Heartbleed and Log4Shell, a…