Laden...
The day's top cybersecurity news and in-depth coverage
December 28, 2022
Log4Shell is likely to remain a favored vulnerability to exploit as organizations lack visibility into their software supply chains. Read more â¶
The year highlighted how vulnerable the technology sector is to the vagaries of geopolitics and the macroeconomy, as IT giants laid off workers, regulators cracked down on tech rule-breakers, nations negotiated data security regulations, the US-China chip war widened, and the Ukraine war disrupted business as usual.
Climate change is causing disruptions to the supply chain and critical services, and attackers are keen to take advantage of it.
Printers are essentially computers attached to your network and should be protected accordingly. Here's how.
LAPSUS$ is just one cybercriminal group that has breached networks of large companies such as Uber and Microsoft by spamming employees with MFA authentication requests.
Security experts share their best advice for the essential ingredients of a solid vulnerability management program, including foundational elements to put in place, workflows to establish, who to involve, and metrics to track.
© 2024