Two new Windows vulnerabilities related to the Adobe Type Manager library are being exploited in targeted attacks.
Google is turning on its Play Protect app scanning feature automatically and changing which apps can be installed on Android devices associated with Advanced Protection Program accounts.
Many security leaders rely on a cost-per-record metric to calculate the costs of a security incident. The latest research from Cyentia Institute using Advisen data shows estimates based on that metric are frequently inaccurate.
Ransomware attackers tend to deploy their payloads at night and on weekends, when IT resources are scarce and security teams may be less active.
Jo Van Bulck of KU Leuven joins Dennis Fisher to discuss the new load value injection attacks on processors.
With so many employees and contractors working remotely, security teams and CISOs grapple with the job of continuing to protect networks, systems, data, and people. One challenge: recognizing clues that something is wrong when nothing looks normal.
A critical flaw in VMware Fusion and Workstation could allow an attacker to run arbitrary code on the host from the guest.
The security of the JavaScript software ecosystem will get a significant boost with GitHub acquiring npm, which hosts and maintains the Node package manager and the package registry. GitHub has the resources to invest in robust and stable infrastructure, thorough vetting of software packages, and integration into GitHub's other services.
More senators are expressing support for the EARN IT Act despite its serious threat to encrypted services and user privacy.
Microsoft has issued a security advisory warning of a vulnerability in the Microsoft Server Message Block (SMB) protocol. Until a fix is available, administrators are advised to disable SMBv3 compression on their servers.
While helping a customer deal with a state-sponsored attack group which had been stealing data and email for about eight months, Microsoft’s incident response team uncovered five other threat actors operating simultaneously on the network.
The United States needs a top-level cybersecurity coordinator, more powers for CISA, and cybersecurity-specific committees in Congress, the Cyberspace Solarium Commission said in its long-awaited report.
Microsoft has taken over the control infrastructure for the Necurs botnet, disrupting the operations of the notorious spam and malware-distribution network.
The Yubico Validation Server contains a pair of vulnerabilities, one of which allows the replay of one-time passwords.
DuckDuckGo's new Tracker Radar tool protects users against pervasive third-party tracking across the web.