Apple has rolled out emergency patches for a pair of already exploited zero-day vulnerabilities in its flagship macOS and iOS platforms. Details on the attacks remain scarce. [Read More]
Trend Micro's Zero Day Initiative is ramping up the pressure on software vendors that consistently ship faulty, problematic security patches. [Read More]
SEC claims 18 individuals and entities conspired with others to hack brokerage accounts to artificially increase the price of specific shares and sell their stock at the inflated prices. [Read More]
Mandiant has been tracking an activity cluster that it believes to be from a single Iranian threat group that has been targeting Israeli interests, especially shipping. [Read More]
When establishing visibility and security controls across endpoints, security practitioners need to understand that each endpoint bears some or all responsibility for its own security.
By understanding how to identify, isolate, and remove unwanted bot and fraud traffic, enterprises can remove the noise clouding the visibility they have into their online applications.
A healthy dose of curiosity and humility can help enterprises ask the right questions, perform the right analysis, and focus on the right topics around improving their fraud programs.
Organizations can strengthen their security posture by getting detailed information on current attack techniques and keeping their employees’ cyber hygiene training up to date.
The adoption of IoT technology used to connect SCADA systems to the internet either directly or indirectly dramatically increases the risk of a successful exploit.