Laden...
The day's top cybersecurity news and in-depth coverage
May 13, 2022
The China-linked backdoor takes advantage of the Berkeley Packet Filter on Unix systems to hide its presence. Read more â¶
Security strategies need to shift from network access to application access. Enter Zero Trust.
Nerbian RAT malware uses significant anti-analysis and anti-reversing capabilities along with multiple open-source Go libraries to conduct malicious activity.
The annual cyber insurance application form shows what the carriers think you should be doing to best prevent and recover from ransomware attacks. Pay attention.
Notable experts say the cybersecurity executive order has improved the nation's security posture, but more work is to be done.
These tools will help identify vulnerabilities and threats posed by third-party code through software composition analysis and SBOM creation.
Suspected state-sponsored threat actor uses IceApple to target technology, academic and government sectors with deceptive software.
Farshchi joined the credit reporting agency in 2018 with a mandate for change following the companyâs high-profile data breach. Today, heâs calling for greater transparency and collaboration in the security community, with Equifax leading the way.
© 2024