7 of the most impactful cybersecurity incidents of 2021.
Views expressed in this cybersecurity-intelligence update are those of the reporters and correspondents.
Accessed on 26 December 2021, 1404 UTC.
Content provided by “DarkReading.com.”
Please click link or scroll down to read your selections.
There was a lot to learn from breaches, vulnerabilities, and attacks this year.
Researchers found an insecure default behavior in Azure App Service exposing source code of some customer applications deployed using “Local Git.”
A new study investigating consumer password use found 25% of online shoppers would abandon their carts of $100 if prompted to reset a password at checkout.
The open-sourced scanner was derived from scanners built by members across the open source community, CISA reports.
The UK’s NCA and NCCU have shared 225 million stolen emails and passwords with HIBP, which tracks stolen credentials.
The Facebook parent company seeks court’s help in identifying the individuals behind some 39,000 websites impersonating its brands to collect login credentials.
Data from dozens of penetration tests and security assessments suggest nearly every organization can be infiltrated by cyberattackers.
Vladislav Klyushin was allegedly involved in a global operation to trade on nonpublic data stolen from US computer networks.
Log4j: A CISO’s Practical Advice
Working together is going to make getting through this problem a lot easier.
The Future of Work Has Changed, and Your Security Mindset Needs to Follow
VPNs have become a vulnerability that puts organizations at risk of cyberattacks.
Log4j Reveals Cybersecurity’s Dirty Little Secret
Once the dust settles on Log4j, many IT teams will brush aside the need for the fundamental, not-exciting need for better asset and application management.
Future of Identity-Based Security: All-in-One Platforms or Do-It-Yourself Solutions?
The functionality of all-in-one platforms is being deconstructed into a smorgasbord of services that can be used to develop bespoke end-user security procedures for specific work groups, lines of businesses, or customer communities.
Preemptive Strategies to Stop Log4j and Its Variants
Zero trust is key to not falling victim to the next big vulnerability.