Security

As supply chain attacks continue to pose significant risks, SBOMs have become a vital tool for secure DevOps and enhanced threat intelligence. Let's explore the six main types of SBOMs, their use cases, and how to select the most suitable one for your organization's needs

The U.S. Department of Justice has another feather in its cyberwarfare cap after taking down the cybercrime network of Turla, a criminal gang linked to Russia called one of the world's most sophisticated cyber-espionage groups

CISOs' concerns grow as 68% anticipate a material cyberattack within a year, showing a shift in attitude toward future threats. Increased attack vectors and a wider attack surface contribute to this sentiment, while employee turnover raises data security risks

CONFERENCE REPORT

RSA Conference Rebounds as Business Risks Soar

Like a persistent piece of malware that your antivirus product just can't seem to eradicate, the annual RSA cybersecurity conference was back with a vengeance this year. But while the malware example is inherently malicious, the industry event seemed to be bustling with goodwill and a positive messa...

Some industry researchers suggest that hiring cybersecurity talent from non-traditional backgrounds, like bartenders or schoolteachers, is an ideal outside-the-box solution

After feeding more than 15.6 million passwords into an AI-powered password cracker, researchers concluded that it is possible to crack 51% of common passwords within a minute

New cyber research connects the infamous North Korea-aligned Lazarus Group behind the Linux malware attack called Operation DreamJob to the 3CX supply-chain attack

The FBI's Denver office is cautioning consumers about using free public charging stations, saying bad actors can use the USB ports at the juice stops to introduce malware and monitoring software onto devices

With a deep understanding of an organization and how the individuals within it interact with their inbox, AI can determine for every email whether it is suspicious and should be actioned or if it is legitimate and should remain untouched

If crime doesn’t pay, some cybercriminals wouldn’t know it. A top team member in a cybercrime outfit like Conti can make an estimated US$1.1 million a year, according to a report released Monday by Trend Micro. Since cybercrime groups don’t file reports with the SEC, the salary ear...

At its Amplify Partner Conference 2023 in Chicago, HP unveiled several new laptops with a focus on productivity, along with new peripherals, including printers and genuinely wireless headphones

Online raiders are stealing IP addresses and converting them to cash by selling them to so-called proxyware services

As generative AI and other future forms of AI advance into cybersecurity, we will finally have the opportunity to mitigate the one security problem that continues to bite us in the butt: ourselves

Dubbed pet tech, pet industry developers use the technology to improve the health, well-being, and overall quality of pets' lives. Apparently, they also use it as a source of data acquisition that puts users' security at risk

Technewsworld Channels