Security
Headlines
HeadlinesLatestCVEs

Tag

#mac

Bug Bounty Radar // The latest bug bounty programs for May 2022

New web targets for the discerning hacker

PortSwigger
#vulnerability#web#mac#apple#js#git#rce#auth#zero_day
Take a Diversified Approach to Encryption

Encryption will break, so it's important to mix and layer different encryption methods.

Data breach at US healthcare provider ARcare impacts 345,000 individuals

Sensitive medical and other personal data was potentially exposed

Security Turbulence in the Cloud: Survey Says…

Exclusive Threatpost research examines organizations’ top cloud security concerns, attitudes towards zero-trust and DevSecOps.

Microsoft Documents Over 200 Cyberattacks by Russia Against Ukraine

At least six different Russia-aligned actors launched no less than 237 cyberattacks against Ukraine from February 23 to April 8, including 38 discrete destructive attacks that irrevocably destroyed files in hundreds of systems across dozens of organizations in the country. "Collectively, the cyber and kinetic actions work to disrupt or degrade Ukrainian government and military functions and

Cyberespionage APT Now Identified as Three Separate Actors

The threat group known as TA410 that wields the sophisticated FlowCloud RAT actually has three subgroups operating globally, each with their own toolsets and targets.

Ambient.ai Expands Computer Vision Capabilities for Better Building Security

The AI startup releases new threat signatures to expand the computer vision platform’s ability to identify potential physical security incidents from camera feeds.

Why you should be taking security advice from your grandmother

We take a look at a report which indicates younger generations are struggling with being able to spot scams, and why that might be. The post Why you should be taking security advice from your grandmother appeared first on Malwarebytes Labs.