New “Trojan Source” method lets attackers hide vulnerabilities in source code.
Views expressed in this cybersecurity-intelligence update are those of the reporters and correspondents.
Accessed on 01 November 2021, 2303 UTC.
Content provided by “DarkReading.com.”
Please click link or scroll down to read your selections.
Researchers discover a new technique attackers could use to encode vulnerabilities into software while evading detection.
SecureCircle provides data-level zero-trust control to endpoints.
A researcher will release an open source tool at Black Hat Europe next week that roots out server weaknesses to a sneaky type of attack.
A Mandiant researcher shares the details of an investigation into the misuse of Pulse Secure VPN devices by suspected state-sponsored threat actors.
Court documents say Vladimir Dunaev is alleged to have been a malware developer for the Trickbot Group.
While car makers are paying more attention to cybersecurity, the evolution of automobiles into “software platforms on wheels” and the quick adoption of new features has put connected cars in the crosshairs.
This tactic — used to distribute REvil ransomware and the SolarMarker backdoor — is part of a broader increase in such attacks in recent months, researchers say.
CWE list aimed at designers and programmers to avoid key hardware weaknesses early in product development.
Understanding the Human Communications Attack Surface
Companies should recognize that collaboration platforms aren’t isolated, secure channels where traditional threats don’t exist.
A Treehouse of Security Horrors
True-life horrors from conversations with software engineers and developers. D’oh!
3 Security Lessons Learned From the Kaseya Ransomware Attack
Organizations can better prepare themselves and their customers for these attacks with some strategies to identify threats before they become a widespread issue.
You’ve Just Been Ransomed … Now What?
Six crucial steps executives and IT teams should be prepared to take immediately after a ransomware attack.
Identity-Focused Security Controls Prevail
How identity and access management strategies held up during the pandemic and tips for putting together an identity security road map.