The day's top cybersecurity news and in-depth coverage
November 16, 2020
The pandemic is constantly testing the strength of enterprise security; it has also revealed numerous weak spots. Read more â¶
If you donât have a lot of budget at your disposal, these open-source intrusion detection tools are worth a look.
Attackers could use the vulnerability to access encryption keys from the Linux kernel's memory or Intel SGX enclaves.
This hacker-for-hire advanced persistent threat group uses its own custom malware and takes great effort to hide its activity.
Voters approved the California Privacy Rights and Enforcement Act (CPRA), which in part limits how organizations can use personal data. Legal experts expect other states to follow suit.
Deception tools have come a long way in a few years and can now more closely emulate real network activity and help security teams identify and stop attacks.