Application Security Must Be NonnegotiableCompanies need to keep security priorities top of mind during economic downturns so all-important revenue generation doesn't come with a heaping side...
Fortra’s Terranova Security 2022 Gone Phishing Tournament Results Reveal Large Organizations at Highest Risk of Compromising Data
Fortra's Terranova Security 2022 Gone Phishing Tournament Results Reveal Large Organizations at Highest Risk of Compromising DataFindings underscore security awareness training that leverages practical, hands-on exercises...
Contrast Security Launches Alliance Program to Change the Way Customers Scale Their Security Solutions
Contrast Security Launches Alliance Program to Change the Way Customers Scale Their Security SolutionsThe Security Innovation Alliance (SIA) empowers customers to create holistic security programs by...
Command-Injection Bug in Cisco Industrial Gear Opens Devices to Complete Takeover
Command-Injection Bug in Cisco Industrial Gear Opens Devices to Complete TakeoverTwo security holes — one particularly gnarly — could allow hackers the freedom to do as...
Gem Security Emerges From Stealth With $11M, Unveils Cloud TDIR Platform for Faster Response to Cloud Threats
Gem Security Emerges From Stealth With $11M, Unveils Cloud TDIR Platform for Faster Response to Cloud ThreatsGem Security provides the world's first holistic approach for Cloud...
Radiant Logic Pursues Identity Governance With Brainwave Buy
Radiant Logic Pursues Identity Governance With Brainwave BuyDeal Means Radiant Logic Can Dump Attestation-Based Audits for a More Rigorous PathRadiant Logic has agreed to buy Brainwave...
White House Mulls Banning Huawei’s Access to US Technology
White House Mulls Banning Huawei's Access to US TechnologyReports Suggest Biden Administration Weighing Move to Blunt Beijing's AmbitionsChinese technology firms could be completely banned from buying...
Piratas informáticos abusaron de las aplicaciones OAuth «Verified Publisher» de Microsoft para violar cuentas de correo electrónico corporativas
Piratas informáticos abusaron de las aplicaciones OAuth «Verified Publisher» de Microsoft para violar cuentas de correo electrónico corporativasMicrosoft dijo el martes que tomó medidas para deshabilitar...
Firmware Flaws Could Spell ‘Lights Out’ for Servers
Firmware Flaws Could Spell 'Lights Out' for ServersFive vulnerabilities in the baseboard management controller (BMC) software used by 15 major vendors could allow remote code execution...
Will Hive Stay Kaput After FBI Busts Infrastructure?
Will Hive Stay Kaput After FBI Busts Infrastructure?Ransomware Group's Servers Remain Dark, But Rebooting Would Pose Scant ChallengeWhat's not to love about an international law enforcement...
Live Webinar | The Payment Optimization Blueprint: Leveraging Data to Improve Performance and Boost the Bottom Line
Live Webinar | The Payment Optimization Blueprint: Leveraging Data to Improve Performance and Boost the Bottom LinePost ContentRead MoreDataBreachToday.com RSS Syndication
Trellix CEO on Unifying Endpoint, SecOps and Data Protection
Trellix CEO on Unifying Endpoint, SecOps and Data ProtectionBryan Palma on How Trellix's Approach to XDR Stands Apart From Others in the MarketTrellix will debut a...
OpenEMR Flaws Could Allow Attackers to Steal Data, More
OpenEMR Flaws Could Allow Attackers to Steal Data, MorePatch Available for Open-Source Electronic Health Records SoftwareA combination of three security flaws contained in an open-source electronic...
CISA to Set Up New Office for Supply Chain Security
CISA to Set Up New Office for Supply Chain SecurityFormer GSA Administrator Leading Effort to Tackle Software Supply Chain IssuesU.S. Federal authorities are establishing a new...
Skyrocketing Cyber Insurance Premium Growth May Slow
Skyrocketing Cyber Insurance Premium Growth May SlowIncreased Competition and Capital Suggest Softening Market, Says Marsh ExecutivePremiums for cyber insurance have climbed sharply along with global rates...
GitHub Breach: los piratas informáticos robaron certificados de firma de código para GitHub Desktop y Atom
GitHub Breach: los piratas informáticos robaron certificados de firma de código para GitHub Desktop y AtomGitHub reveló el lunes que actores de amenazas desconocidos lograron exfiltrar...
QNAP soluciona una vulnerabilidad crítica en los dispositivos NAS con las últimas actualizaciones de seguridad
QNAP soluciona una vulnerabilidad crítica en los dispositivos NAS con las últimas actualizaciones de seguridadLa empresa taiwanesa QNAP ha publicado actualizaciones para remediar una falla de...
Cybercrime Ecosystem Spawns Lucrative Underground Gig Economy
Cybercrime Ecosystem Spawns Lucrative Underground Gig EconomyThe complex nature of cyberattacks has increased demand for software developers, reverse engineers, and offensive specialists — attracting workers facing...
SentinelOne and KPMG Announce Alliance To Accelerate Cyber Investigations and Response
SentinelOne and KPMG Announce Alliance To Accelerate Cyber Investigations and ResponsePost ContentRead MoreDark Reading
Russia’s Sandworm APT Launches Swarm of Wiper Attacks in Ukraine
Russia's Sandworm APT Launches Swarm of Wiper Attacks in UkraineThe incidents are the latest indication of the growing popularity of dangerous disk wipers, created to disrupt...
Are Your Employees Thinking Critically About Their Online Behaviors?
Are Your Employees Thinking Critically About Their Online Behaviors?Three mindset shifts will help employees build a habit of vigilance and make better security decisions. Move past...
Sentra Raises $30 Million Series A Financing to Meet Growing Demand for Data Security in the Cloud
Sentra Raises $30 Million Series A Financing to Meet Growing Demand for Data Security in the CloudStandard Investments leads round with participation from Munich Re Ventures,...
Aura and Nonprofit Cyversity Partner to Support a More Inclusive Cyber Workforce
Aura and Nonprofit Cyversity Partner to Support a More Inclusive Cyber WorkforceMentoring, scholarships, and professional development opportunities will be offered to those underrepresented in the industry...
New Survey Reveals 40% of Companies Experienced a Data Leak in the Past Year
New Survey Reveals 40% of Companies Experienced a Data Leak in the Past YearSysKit report highlighting effects of digital transformation on IT admins and governance landscape...
NanoLock Addresses Global Industrial & OT Cyber Demand with Expansions into Europe and North America
NanoLock Addresses Global Industrial & OT Cyber Demand with Expansions into Europe and North AmericaTo meet a pressing demand for industrial and OT security, zero-trust, device-level...
Founder Sachin Nayyar Back as CEO of Identity Vendor Saviynt
Founder Sachin Nayyar Back as CEO of Identity Vendor SaviyntNayyar Will Pursue New Machine Identity Management Business During 2nd Stint as CEOSaviynt has brought founder and...
Russian Sandworm APT Adds New Wiper to Its Arsenal
Russian Sandworm APT Adds New Wiper to Its ArsenalMilitary Intelligence-Linked Group Attacked Ukrainian Energy Sector Firm, Says EsetSecurity researchers say they found the Russian intelligence-linked Sandworm...
Cybercrime Ecosystem Spawns Lucrative Underground Gig Economy
Cybercrime Ecosystem Spawns Lucrative Underground Gig EconomyThe complex nature of cyberattacks has increased demand for software developers, reverse engineers, and offensive specialists — attracting workers facing...
Are We Doomed? Not If We Focus on Cyber Resilience
Are We Doomed? Not If We Focus on Cyber ResilienceIn this episode of "Cybersecurity Unplugged," Patricia Muoio, a partner at SineWave Ventures, discusses the need for...
Tenable’s $25M Venture Capital Fund Seeks Early-Stage Firms
Tenable's $25M Venture Capital Fund Seeks Early-Stage FirmsNew Tenable Ventures Fund Focuses on Cloud, OT, Code, Identity and Backs 3 StartupsTenable has debuted a $25 million...


























