Threat intelligence vendor Recorded Future is reporting a wave of targeted attacks against power plants, electricity distribution centers and seaports in India.
Identity-as-a-Service (IDaaS) company Auth0 announced on Monday that Jameeka Green Aaron has joined the company as Chief Information Security Officer (CISO).
Leveraging security ratings as part of your cyber risk management program provides metrics that help you cut through the complexity to understand where the risk lies in your digital and vendor ecosystem.
Cybersecurity startup 1Kosmos emerged from stealth mode with $15 million in Series A funding from ForgePoint Capital to gain traction with its digital identity and authentic solutions.
SecurityWeek's Supply Chain Security Summit will examine the current state of supply chain attacks, the weakest links along the way, the biggest supply chain hacks in history, and best practices for managing this massive attack surface.
SecurityWeek today will host IoT Lockdown, a virtual event where attendees can learn about innovative strategies and tools to mitigate the risk of IoT devices connected to enterprise networks, along with industrial and smart city environments.
According to a Wall Street Journal report, TikTok used a banned tactic to bypass the privacy safeguard in Android to harvest unique identifiers from millions of mobile devices.
Ongoing coverage of the SolarWinds Orion attacks and useful resources, including analysis and indicators of compromise (IOC). Check back often for updates.
the plan sets out priorities and goals around the establishment of global standards to define maritime threats, beefing up threat intel and information sharing, and increasing the cybersecurity workforce in the maritime sector.
The 47-minute outage last Monday, which severely affected operations at workplaces and schools globally, was caused by a bug in an automated quota management system that powers the Google User ID Service.
A report from IBM and Dragos warns that ransomware operators are increasingly incorporating data theft and extortion operations into their attack techniques.
The U.S. government added a new wrinkle to the global emergency response to the SolarWinds software supply chain attack, warning of additional initial access vectors that have not yet been documented.