Security
SecurityDependency Confusion Attacks: New Research Into Which Businesses are At Risk
Dependency confusion is becoming a serious cybersecurity threat. Learn which organizations are at risk and how to protect systems against these attacks.
You're on page 38, See the latest articles on Security.
Dependency confusion is becoming a serious cybersecurity threat. Learn which organizations are at risk and how to protect systems against these attacks.
Learn technical details about this newly disclosed security vulnerability, as well as mitigation recommendations from the Google researcher who discovered it.
As attackers focus on political ends, big payouts, threat hunters need to focus on identity intrusions, access merchants and tactics enabling fast lateral movement.
Discover the challenges that AI will bring to the cybersecurity industry and the opportunities and future implications of cybersecurity in an AI-dominated world.
Microsoft is working on creating guidelines for red teams making sure generative AI is secure and responsible.
Qualys report looks at how misconfiguration issues on cloud service providers help attackers gain access.
ChatGPT-related security risks also include writing malicious code and amplifying disinformation. Read about a new tool advertised on the Dark Web called WormGPT.
Advances in graphics processing technology and AI have slashed the time needed to crack a password using brute force techniques, says Hive Systems.
Discover the new shadow IT guidance published by the U.K.'s NCSC. Use this guide to better identify and reduce the levels of shadow IT within your organization.
Adobe, Arm, Intel, Microsoft and Truepic put their weight behind C2PA, an alternative to watermarking AI-generated content.
Agents of the FBI and Homeland Security at the Northeast Cybersecurity Summit revealed how cyberintelligence collaboration works. Learn more with our article.
Discover the new models used to assign security budgets that succeed where traditional and outdated processes fail.
Learn about Arc's features, pros and cons, and what makes the web browser unique. Arc is available only for Mac and iPhone users.
In alliance with Cohesity and others, Cisco is fueling near-zero latency between ransomware detection and remediation with its Extended Detection and Response platform.
This is a comprehensive LogRhythm vs Splunk SIEM tool comparison. Use our guide to learn more about features, pricing and more.