News brief: Cyberattack trends signal security arms race
Friday, July 18, 2025
Check out the latest security news from the Informa TechTarget team. .. read more..
AI in risk management: Top benefits and challenges explained
Tuesday, July 15, 2025
AI can improve the speed and effectiveness of risk management strategies. Here are the potential benefits, use cases and challenges your organization needs to know about. .. read more..
How to perform a cybersecurity risk assessment in 5 steps
Wednesday, July 9, 2025
When assessing cybersecurity risk, be sure to consider the scope of the project, your organization's specific assets and leadership's tolerance for risk. .. read more..
What is a CISO as a service (CISOaaS)?
Wednesday, July 9, 2025
CISO as a service, or CISOaaS, is the outsourcing of CISO (chief information security officer) and information security leadership responsibilities to a third-party provider. .. read more..
Microsoft targets 130 vulnerabilities on July Patch Tuesday
Tuesday, July 8, 2025
Admins will want to focus on issuing corrections for the large number of flaws, some of which require no user interaction, in Windows RRAS and Microsoft Office. .. read more..
News brief: LOTL attacks, spoofed sites, malicious repositories
Friday, June 20, 2025
Check out the latest security news from the Informa TechTarget team. .. read more..
What is a time-based one-time password?
Monday, June 2, 2025
A time-based one-time password (TOTP) is a temporary passcode generated by an algorithm that uses the current time of day as one of its authentication factors. .. read more..
What is security?
Friday, May 30, 2025
Security for information technology (IT) refers to the methods, tools and personnel used to defend an organization's digital assets. .. read more..
News brief: Week's top breaches stem from third-party attacks
Friday, May 30, 2025
Check out the latest security news from the Informa TechTarget team. .. read more..
What is a passkey?
Wednesday, May 21, 2025
A passkey is an alternative user authentication method that eliminates the need for usernames and passwords. .. read more..
News brief: Patch critical SAP, Samsung and chat app flaws now
Friday, May 16, 2025
Check out the latest security news from the Informa TechTarget team. .. read more..
What is penetration testing?
Wednesday, May 14, 2025
A penetration test, also called a 'pen test,' is a simulated cyberattack on a computer system, network or application to identify and highlight vulnerabilities in an organization's security posture. .. read more..
What are the top 10 spyware threats?
Thursday, May 8, 2025
The top 10 spyware list describes the most common spyware threats behind famous spyware attacks and is frequently identified by leading antispyware tools from vendors like Webroot, Norton and Malwarebytes. .. read more..
How to conduct ransomware awareness training for employees
Monday, April 14, 2025
As your organization's first line of defense, hold regular employee training on how to prevent, detect and respond to ransomware attacks. .. read more..
Model Context Protocol fever spreads in cloud-native world
Wednesday, April 2, 2025
The Anthropic-led spec for AI agent tool connections gains further momentum this week, with support from cloud-native infrastructure vendors such as Kubiya and Solo.io. .. read more..
What is a uniform resource identifier (URI)?
Wednesday, April 2, 2025
.. read more..
What is a hacker?
Monday, March 31, 2025
.. read more..
News brief: China-linked APTs and Russian access broker
Friday, March 28, 2025
.. read more..
What is IT automation? A complete guide for IT teams
Thursday, March 27, 2025
.. read more..
5 fundamental strategies for REST API authentication
Monday, March 17, 2025
.. read more..
Zero-Day Breach at Rackspace Sparks Vendor Blame Game
Wednesday, October 2, 2024
A breach at Rackspace exposes the fragility of the software supply chain, triggering a blame game among vendors over an exploited zero-day. The post Zero-Day Breach at Rackspace Sparks Vendor Blame Game appeared first on SecurityWeek . .. read more..
MITRE Adds Mitigations to EMB3D Threat Model
Wednesday, October 2, 2024
MITRE has expanded the EMB3D Threat Model with essential mitigations to help organizations address threats to embedded devices. The post MITRE Adds Mitigations to EMB3D Threat Model appeared first on SecurityWeek . .. read more..
US, Allies Release Guidance on Securing OT Environments
Wednesday, October 2, 2024
New guidance provides information on how to create and maintain a secure operational technology (OT) environment. The post US, Allies Release Guidance on Securing OT Environments appeared first on SecurityWeek . .. read more..
Cryptocurrency Wallets Targeted via Python Packages Uploaded to PyPI
Wednesday, October 2, 2024
Multiple Python packages referencing dependencies containing cryptocurrency-stealing code were published to PyPI. The post Cryptocurrency Wallets Targeted via Python Packages Uploaded to PyPI appeared first on SecurityWeek . .. read more..
Harmonic Raises $17.5M to Defend Against AI Data Harvesting
Wednesday, October 2, 2024
Harmonic has raised a total of $26 million to develop a new approach to data protection using pre-trained, specialized language models. The post Harmonic Raises $17.5M to Defend Against AI Data Harvesting appeared first on SecurityWeek . .. read more..
Record-Breaking DDoS Attack Peaked at 3.8 Tbps, 2.14 Billion Pps
Wednesday, October 2, 2024
Cloudflare recently mitigated another record-breaking DDoS attack, peaking at 3.8 Tbps and 2.14 billion Pps. The post Record-Breaking DDoS Attack Peaked at 3.8 Tbps, 2.14 Billion Pps appeared first on SecurityWeek . .. read more..
After Code Execution, Researchers Show How CUPS Can Be Abused for DDoS Attacks
Wednesday, October 2, 2024
Over 58,000 internet-exposed CUPS hosts can be abused for significant DDoS attacks, according to Akamai. The post After Code Execution, Researchers Show How CUPS Can Be Abused for DDoS Attacks appeared first on SecurityWeek . .. read more..
Critical Zimbra Vulnerability Exploited One Day After PoC Release
Wednesday, October 2, 2024
A critical-severity vulnerability in Zimbra has been exploited in the wild to deploy a web shell on vulnerable servers. The post Critical Zimbra Vulnerability Exploited One Day After PoC Release appeared first on SecurityWeek . .. read more..
T-Mobile to Pay Millions to Settle With FCC Over Data Breaches
Tuesday, October 1, 2024
T-Mobile has agreed to invest $15.75 million in cybersecurity and pay $15.75 million to settle an FCC investigation into four data breaches. The post T-Mobile to Pay Millions to Settle With FCC Over Data Breaches appeared first on SecurityWeek . .. read more..
More LockBit Hackers Arrested, Unmasked as Law Enforcement Seizes Servers
Tuesday, October 1, 2024
Previously seized LockBit websites have been used to announce more arrests, charges and infrastructure disruptions. The post More LockBit Hackers Arrested, Unmasked as Law Enforcement Seizes Servers appeared first on SecurityWeek . .. read more..
Landmark Admin Discloses Data Breach Of Medical Info
Monday, July 1, 2024
.. read more..
Google Offering $250k For Full VM Escape In New KVM Bug Bounty Program
Monday, July 1, 2024
.. read more..
regreSSHion: Remote Unauthenticated Code Execution Vulnerability In OpenSSH S...
Monday, July 1, 2024
.. read more..
Juniper Issues Emergency Patches For Perfect 10 Router Vuln
Monday, July 1, 2024
.. read more..
Vanna AI Prompt Injection Vulnerability Enables RCE
Friday, June 28, 2024
.. read more..
Russian APT Reportedly Behind New TeamViewer Hack
Friday, June 28, 2024
.. read more..
Mac Users Served Info Stealer Malware Through Google Ads
Friday, June 28, 2024
.. read more..
Google Cuts Ties With Entrust In Chrome Over Trust Issues
Friday, June 28, 2024
.. read more..
GitLab Security Updates Patch 14 Vulnerabilities
Thursday, June 27, 2024
.. read more..
Designed Receivable Solutions Data Breach Impacts 585,000 People
Thursday, June 27, 2024
.. read more..
Korean Telco Allegedly Infected Its P2P Users With Malware
Thursday, June 27, 2024
.. read more..
New MOVEit Critical Bug Sees Swift Exploitation Attempts
Thursday, June 27, 2024
.. read more..
Feds Put $5M Bounty On CryptoQueen Ruja Ignatova
Thursday, June 27, 2024
.. read more..
US Lawmakers Wave Red Flags Over Chinese Drone Dominance
Thursday, June 27, 2024
.. read more..
WhisperGate Suspect Indicted As US Offers A $10 Million Bounty
Thursday, June 27, 2024
.. read more..
Probllama: Ollama Remote Code Execution Vulnerability
Wednesday, June 26, 2024
.. read more..
Polyfill Supply Chain Attack Hits Over 100k Websites
Wednesday, June 26, 2024
.. read more..
Microsoft Blamed For Million-Plus Patient Record Theft At US Hospital Giant
Wednesday, June 26, 2024
.. read more..
P2Pinfect Worm Now Dropping Ransomware On Redis Servers
Wednesday, June 26, 2024
.. read more..
Ebay Seller Offers Stingray Device For $100,000
Wednesday, June 26, 2024
.. read more..