Better communication and collaboration between researchers and vendors and improved bug reporting mechanisms could help address confusing and sometimes wholly suppressed bug reports.
The DPRK group’s attempts to exfiltrate data and install RMM tools by posing as US IT workers is one of several examples that show cross-domain analysis is needed to tackle rising identity-based attacks, according to CrowdStrike’s counter
CISOs should look to proactively incorporate new lessons in their incident response, disaster recovery, crisis communications, and contingency workforce playbooks — and revisit agreements with software providers.
The conservative think tank blueprint for how Donald Trump should govern the US if he wins in November calls for dismantling CISA, among many cyber-related measures. Experts say this would increase cybersecurity risks, undermine critical infrastructu
While recent efforts promise a more secure future for software, experts say several challenges could still vex organizations as they try to improve software security.
The ruling could weaken almost all US federal cybersecurity regulations, including SEC incident reporting, FCC data breach reporting, and CISA cyber incident reporting rules.
At this year’s cybercrime-oriented conference Sleuthcon, Morocco emerged as a locus of cybercrime, while UK and US law enforcement highlighted how creative they've become in shaming and disrupting criminal groups.
An attack on remote monitoring devices in Japan underscores an emerging cybersecurity threat to the rapidly growing solar component of the power grid. Inverters used with solar panels could pose a more significant risk.