8 Security Startups to Watch in 2022 January 25, 2022 / Kelly Sheridan, Senior Editor Cloud security, API security, and incident response are among the issues up-and-coming security companies are working on.
The Case for Backing Up Source Code January 24, 2022 / Kelly Sheridan, Senior Editor As enterprise data security concerns grow, security experts urge businesses to back up their GitLab, GitHub, and BitBucket repositories.
FireEye & McAfee Enterprise Renamed as Trellix January 19, 2022 / Kelly Sheridan, Senior Editor Symphony Technology Group announces a name for the newly merged company, which aims to become a leader in extended detection and response (XDR).
Researchers Explore Hacking VirusTotal to Find Stolen Credentials January 18, 2022 / Kelly Sheridan, Senior Editor VirusTotal can be used to collect large amounts of credentials without infecting an organization or buying them online, researchers found.
New Cyberattack Campaign Uses Public Cloud Infrastructure to Spread RATs January 12, 2022 / Kelly Sheridan, Senior Editor An attack campaign detected in October delivers variants of Nanocore, Netwire, and AsyncRATs to target user data.
Microsoft Kicks Off 2022 With 96 Security Patches January 11, 2022 / Kelly Sheridan, Senior Editor Nine of the Microsoft patches released today are classified as critical, 89 are Important, and six are publicly known.
Microsoft: macOS ‘Powerdir’ Flaw Could Enable Access to User Data January 10, 2022 / Kelly Sheridan, Senior Editor The vulnerability could allow an attacker to bypass the macOS Transparency, Consent, and Control measures to access a user's protected data.
Microsoft: macOS ‘Powerdir’ Flaw Could Let Attackers Gain Access to User Data January 10, 2022 / Kelly Sheridan, Senior Editor The vulnerability could allow an attacker to bypass the macOS Transparency, Consent, and Control measures to access a user's protected data.
Microsoft: macOS ‘Powerdir’ Flaw Could Let Attackers Gain Access to User Data January 10, 2022 / Kelly Sheridan, Senior Editor The vulnerability could allow an attacker to bypass the macOS Transparency, Consent, and Control measures to access a user's protected data.
Google Docs Comments Weaponized in New Phishing Campaign January 6, 2022 / Kelly Sheridan, Senior Editor Attackers use the comment feature in Google Docs to email victims and lure them into clicking malicious links.