Articles of interest from the week of May 16, 2022

VMware Issues Critical Fixes, CISA Orders Federal Agencies To Act Immediately (CVE-2022-22972)

The U.S. Cybersecurity and Infrastructure Agency issues an emergency security directive over VMware vulnerabilities CVE-2022-22972 and CVE-2022-22973,

16 May 2022
Read More

Articles of interest from the week of May 2, 2022

Security Stuff Happens: What Will the Public Hear When You Say You've Been Breached?

A company's response to a breach is more important than almost anything else. But what constitutes a "good" response following a security incident? (By Tyler

02 May 2022
Read More

Articles of interest from the week of April 18, 2022

Report: Many SMBs Wouldn’t Survive a Ransomware Attack

Some 75% of SMBs polled in a recent survey said they’d be able to survive only three to seven days following a ransomware attack. A successful ransomware attack can devastate any size

18 Apr 2022
Read More

Articles of interest from the week of April 4, 2022

Nearly 40% of Macs Left Exposed to 2 Zero-Day Exploits

Between 35% and 40% of all supported Macs might be at heightened risk of compromise from two zero-day vulnerabilities that Apple has said are being exploited in the wild, but for which the

07 Apr 2022
Read More

Articles of interest from the week of March 21, 2022

Browser-in-the-Browser Attack Makes Phishing Nearly Invisible

Can we trust web browsers to protect us, even if they say “HTTPS?” Not with the novel BitB attack, which fakes popup SSO windows to phish away credentials for Google, Facebook and

21 Mar 2022
Read More

Articles of interest from the week of March 7, 2022

How Attackers Sidestep the Cyber Kill Chain

Many of the most popular cyberattacks don't follow all the steps of the cyber kill chain, but you have other methods to detect threats. (By Maria Korolov, CSO)

07 Mar 2022
Read More
Previous 1 2 3 4 5 ... 18 Next