Generative Data Intelligence

Tag: Cybersecurity and Infrastructure Security Agency

Ivanti Pledges Security Overhaul the Day After 4 More Vulns Disclosed

Ivanti CEO Jeff Abbott this week said his company will completely revamp its security practices even as the vendor disclosed another fresh set of...

How often should you change your passwords?

Digital Security And is that actually the right question to ask? Here’s what...

Are You Affected by the Backdoor in XZ Utils?

Red Hat is warning that a vulnerability in XZ Utils, the XZ format compression utility included in many Linux distributions is a backdoor. Users...

Lessons From the LockBit Takedown

Like most operators out there, we really enjoyed last month's news about international law enforcement disrupting LockBit, one of the world's most profitable ransomware...

Patch Now: Critical Fortinet RCE Bug Under Active Attack

As expected, cyberattackers have pounced on a critical remote code execution (RCE) vulnerability in the Fortinet Enterprise Management Server (EMS) that was patched last...

CISA Seeks to Curtail ‘Unforgivable’ SQL Injection Defects

SQL injection vulnerabilities continue to plague supply chains, prompting a joint alert from the Cybersecurity and Infrastructure Security Agency (CISA) and the Federal Bureau...

Using East–West Network Visibility to Detect Threats in Later Stages of MITRE ATT&CK

The Cybersecurity and Infrastructure Security Agency (CISA) calls "insufficient internal network monitoring" one of 10 most common network misconfigurations. Indeed, network analysis and visibility...

Using East–West Network Visibility to Detect Threats in Later Stages of MITRE ATT&CK

The Cybersecurity and Infrastructure Security Agency (CISA) calls "insufficient internal network monitoring" one of 10 most common network misconfigurations. Indeed, network analysis and visibility...

Election cybersecurity: Protecting the ballot box and building trust in election integrity

Critical Infrastructure What cyberthreats could wreak havoc on elections this year and how...

CISO Corner: NSA Guidelines; a Utility SBOM Case Study; Lava Lamps

Welcome to CISO Corner, Dark Reading's weekly digest of articles tailored specifically to security operations readers and security leaders. Each week, we'll offer articles...

Latest Intelligence

spot_img
spot_img
spot_img

Chat with us

Hi there! How can I help you?