SecurityWeek spoke with more than 300 cybersecurity experts to see what is bubbling beneath the surface, and examine how those evolving threats will present...
Hi, what are you looking for?
SecurityWeek spoke with more than 300 cybersecurity experts to see what is bubbling beneath the surface, and examine how those evolving threats will present...
Cybereason GootLoader as a ‘severe’ threat, as the malware uses a combination of evasion and living off the land techniques, making its presence difficult...
As it evolves, web3 will contain and increase all the security issues of web2 – and perhaps add a few more.
Zero trust is not a replacement for identity and access management (IAM), but is the extension of IAM principles from people to everyone and...
Pig Butchering, also known as Sha Zhu Pan and CryptoRom, is an ugly name for an ugly scam.
SecurityWeek investigates how political/economic conditions will affect venture capital funding for cybersecurity firms during 2023.
The cryptopocalypse is the point at which quantum computing becomes powerful enough to use Shor’s algorithm to crack PKI encryption.
The changing nature of what we still generally call ransomware will continue through 2023, driven by three primary conditions.
The three primary drivers for cyber regulations are voter privacy, the economy, and national security – with the complication that the first is often...
The supply chain threat is directly linked to attack surface management, but the supply chain must be known and understood before it can be...
A new report found that 98% of organizations have a relationship with a third party that has been breached, while more than 50% have...
Despite some geopolitical overlaps with state attackers, the majority of cyberattacks still come from simple – or perhaps sophisticated – criminals who are more...