Manufacturing and Healthcare Share Struggles with Passwords
The two key economic sectors struggle with security for a reason: Many insiders view access management as a roadblock, while attackers see it as a way in.
Topic
134 articles found
The two key economic sectors struggle with security for a reason: Many insiders view access management as a roadblock, while attackers see it as a way in.
CVE-2025-53521 was initially disclosed in October as a high-severity denial-of-service (DoS) flaw, but new information has revealed the bug is actually much more dangerous.
The massive amount of junk code that hides the malware's logic from security scans was almost certainly generated by AI, researchers say.
Nation-state malware is being sold on the Dark Web and leaked to GitHub; and ordinary organizations might not stand much of a chance of defending themselves.
The post-quantum future may be coming sooner than you think, as Google plans to have PQC migration in place by 2029.
Operational technology (OT) at industrial and critical infrastructure sites seem to have been benefitting from a lull in ransomware, and hackers' relative ignorance of OT systems.
The list of countries exploiting Internet-connected cameras to give them eyes inside their adversaries' borders continues to expand. What should companies look out for?
Chinese APT Red Menshen's super-advanced BPFdoor malware defeats traditional cybersecurity protections. All telcos can do, really, is try hunting it down.
Organizations disclose attack details, though information may be limited, following a breach, but what if they did the same with close calls?
For the first time, SANS Institute's five top attack techniques all have one thing in common — AI.
A series of campaigns that began in August aim to defraud job candidates, using psychological tactics and data scraped from LinkedIn profiles.
Publicly accusing an entity of a cyberattack could have negative consequences that organizations should consider before taking the plunge.
While US government sits out this year, EU officials are on the ground in San Francisco leading the conversations on today's top cybersecurity challenges.
Third-party resellers and brokers foil transparency efforts and allow spyware to spread despite government restrictions, a study finds.
AI models often hallucinate or make costly mistakes when tasked with recommending software versions, upgrade paths, and security fixes — leading to significant technical debt.
Organizations repeatedly expose ports, reuse passwords, and skip patches, creating security gaps that attackers exploit for breaches. An industry veteran outlines ways to fix these common mistakes.
Threats actors pounced on the code injection vulnerability within hours of its disclosure, demonstrating that organizations have little time to address critical bugs.
More than a decade since the 2015 Jeep hack, the cybersecurity of vehicles remains of the utmost importance.
The agency put foreign-made consumer routers on its list of prohibited communications devices, but the ban could create more problems down the road.
The Cloud Security Alliance creates a dedicated nonprofit to govern autonomous AI agent ecosystems through risk intelligence and certification.