The UK MoD has failed to protect personally identifiable information (PII) for Afghan interpreters; the incident highlights how avoidable cybersecurity mistakes can have devastating consequences. f…
Wireless security protocols have improved, but product vendors continue to make implementation errors that allow a variety of attacks. from Dark Reading: https://ift.tt/2VD4D9S
New research suggests isolation among cloud customer accounts may not be a given -- and the researchers behind the findings issue a call to action for cloud security. from Dark Reading: https://ift…
Organizations that don't implement end-to-end HTTP/2 are vulnerable to attacks that redirect users to malicious sites and other threats, security researcher reveals at Black Hat USA. from Dark …
"We can't do this alone," the new CISA director told attendees in a keynote at Black Hat USA today. from Dark Reading: https://ift.tt/3ysOUIW
Mandiant experts discuss the novel techniques used to evade detection, automate data theft, and achieve persistent access. from Dark Reading: https://ift.tt/37sdQUQ
Attacks require executing code on a system but foil Apple's approach to protecting private data and systems files. from Dark Reading: https://ift.tt/3AeWMhD
Researchers at Black Hat USA explain issues around defending "Golden Secrets" and present an approach to solving the problem. from Dark Reading: https://ift.tt/3rVfR5u
Security leaders are challenged to fill application security and cloud computing jobs in particular, survey data shows. from Dark Reading: https://ift.tt/3CiZZOW
In his keynote address at Black Hat USA on Wednesday, Matt Tait, chief operating officer at Corellium, called for software platform vendors and security researchers to do their part to thwart the fal…
At the inaugural Omdia Analyst Summit, experts discuss where the past year has created gaps in traditional security strategy and how organizations can fill them. from Dark Reading: https://ift.tt/2…
"PwnedPiper" flaws could allow attackers to disrupt delivery of lab samples or steal hospital employee credentials, new research shows. from Dark Reading: https://ift.tt/2V5QOkp
Security researchers and practitioners share a host of new cyber tools for penetration testing, reverse engineering, malware defense, and more. from Dark Reading: https://ift.tt/3rETKjC
In response to growing concerns regarding the recent uptick in large-scale, nation-state-backed ransomware attacks on critical infrastructure, the Biden administration is taking new action to tackle …
A sneak peek of some of the main themes at Black Hat USA next month. from Dark Reading: https://ift.tt/3wYDuez
DOJ indicts four Chinese individuals for alleged role in attacks targeting intellectual property, trade secrets belonging to defense contractors, maritime companies, aircraft service firms, and other…
Campbell Conroy & O'Neil reports the attack affected personal data including Social Security numbers, passport numbers, and payment card data for some individuals. from Dark Reading: https:…
DOJ indicts four Chinese individuals for alleged role in attacks targeting intellectual property, trade secrets belonging to defense contractors, maritime companies, aircraft service firms, and other…
Web application attacks against the video game industry quadrupled in 2020 compared to the previous year, but companies outside entertainment can learn from the data. from Dark Reading: https://ift…
An investigation finds Pegasus spyware, intended for use on criminals and terrorists, has been used in targeted campaigns against others around the world. from Dark Reading: https://ift.tt/2UUGWt9…
A new campaign has been observed leveraging fake websites advertising popular software…
Copyright © All Rights Reserved | Cyber Hawk.
Share