Laden...
The day's top cybersecurity news and in-depth coverage
February 05, 2022
One known tactic is conducting reconnaissance on potential targets, then working to identify entry points including vulnerable software or systems. Read more â¶
This report focuses on the recent shifts in learning trends over the past year. Get your copy to see the trending and in-demand tech skills that can help shape your skills development initiatives in 2022.
Security startups are often innovation leaders. These are some of the most interesting ones to watch as they tackle issues around cloud security, asset management and more.
The CSRB will advise the President and Department of Homeland Security director, as well as review major security events starting with the Log4j exploits.
The open-source tool simulates online browsing and shopping to identify malicious code meant to steal payment card information on retailers' websites.
The NPM JavaScript registry has experienced a jump in malware, including packages related to data theft, crypto mining, botnets, and remote code execution, according to security company WhiteSource.
Tagging devices such as Apple's AirTag can be misused by employees, criminals, and competitors to track people and devices in a way that puts organizations at risk.
Keep up with news of CSO, CISO, and other senior security executive appointments.
© 2024