Growing number of endpoint security tools overwhelm users, leaving devices unprotected
Enterprises that use endpoint security and management technologies face a problem of growing marketplace “sprawl,” as new tools proliferate and options multiply, according to a...
Endpoint Security: The Key to Combatting Sophisticated CTAs
Endpoint security is a crucial element of your efforts to mount a proper defense against sophisticated cyber threat actors (CTAs).[…] Read More
Cohesity Data Cloud 7.0 enhances privileged access authentication, ransomware recovery
Data security and management vendor has announced the 7.0 software release of its Cohesity Data Cloud platform. The release provides customers with enhanced cyber resiliency...
#SOOCon23: UK Government Urges Industry Input on Software Security Policy
A UK government official asks the cyber industry, including the open software community, to help shape software security policies Read More
USN-5849-1: Heimdal vulnerabilities
Helmut Grohne discovered that Heimdal GSSAPI incorrectly handled logical conditions that are related to memory management operations. An attacker could possibly use this issue to...
Surge of swatting attacks targets corporate executives and board members
At around 8:45 pm on February 1, 2023, a caller to the Groveland, Massachusetts, 911 emergency line told dispatchers that he harmed someone in a...
SolarWinds and Market Incentives
In early 2021, IEEE Security and Privacy asked a number of board members for brief perspectives on the SolarWinds incident while it was still breaking...
BEC Attacks Surge 81% in 2022
Open rates for emails hit 28% Read More
#SOOCon23: Global Cooperation Needed to Enhance Open Source Software Security
A panel of policy experts discuss how to improve global cooperation around open source software security Read More
CISA Releases Recovery Tool for VMware Ransomware Victims
Legacy bug in ESXi servers is being targeted by threat actors Read More