-
"Majority of US Defense Contractors Not Meeting Basic Cybersecurity Requirements"According to researchers at CyberSheath, nearly nine in 10 (87%) of US defense contractors are failing to meet basic cybersecurity regulation requirements. The researchers surveyed 300 US-based Department of Defense (DoD) contractors and found that…
-
"New Connected Device Security Maturity Model Helps Orgs Strengthen Cybersecurity"Ordr, a connected device security firm, has released a maturity model to aimed at helping healthcare organizations evaluate and improve their connected devices' security. The guide is divided into five maturity stages, each with recommended actions and…
-
Spotlight on Lablet Research #36 - Coordinated Machine Learning-Based Vulnerability and Security Patching for Resilient Virtual Computing InfrastructureSpotlight on Lablet Research #36 - Coordinated Machine Learning-Based Vulnerability and Security Patching for Resilient Virtual Computing Infrastructure
-
-
-
"Zero-Day Flaw Discovered in Quarkus Java Framework"Security researchers at Contrast Security have discovered a high-severity zero-day vulnerability in the Red Hat build of Quarkus, a full-stack, Kubernetes-native Java framework optimized for Java virtual machines (JVMs) and native compilation. …
-
"Where CISOs Rely on AI and Machine Learning to Strengthen Cybersecurity"As malware-less attacks become increasingly difficult to detect and stop, CISOs face a threat landscape in which malicious actors grow more sophisticated than security and Information Technology (IT) teams can keep up. However, Artificial Intelligence (…
-
Cyber Scene #74 - Chips Ahoy on Cyber Thursday HorizonCyber Scene #74 - Chips Ahoy on Cyber Thursday Horizon
-
"Businesses Increasing Cyber Spend Without Clear Strategy, Fastly Finds"According to security researchers at Fastly, most businesses worldwide claim to be confident that their current cybersecurity budgets are fit for their needs, but at the same time, they would be willing to spend more. The researchers noted that…
-
"Most Small Biz IaaS Users Seeing Surge in Attacks"Security researchers at Sophos have found that SMBs are increasingly exposed via their cloud infrastructure, with over half experiencing an increase in the volume (56%) and complexity (59%) of attacks over the past year. The researchers surveyed…
-
"China-Linked UNC4191 APT Relies on USB Devices in Attacks Against Entities in the Philippines"Researchers at Mandiant discovered an alleged China-linked cyberespionage group, UNC4191, using Universal Serial Bus (USB) devices as attack vectors in campaigns targeting entities in the Philippines. This campaign has been active since September 2021…
-
"33% Of Attacks in the Cloud Leverage Credential Access"The Elastic Global Threat Report 2022 details the evolving nature of cybersecurity threats as well as the increased sophistication of cloud and endpoint-related attacks. Thirty-three percent of cloud attacks use credential access, suggesting that users…
News