Meta removed three foreign influence operations from the Facebook platform during Q3, 2023. Two were Chinese in origin, and one was Russian, the company...
Hi, what are you looking for?
Meta removed three foreign influence operations from the Facebook platform during Q3, 2023. Two were Chinese in origin, and one was Russian, the company...
Hacktivism is evolving. It is important for both the law and cyber defenders to understand the current and potential activity of hacktivism to better...
The top five categories of Bad Bot attacks are fake account creation, account takeovers, scraping, account management, and in-product abuse.
New York City and Washington DC-based startup Zip Security raised $7.7 million seed financing led by General Catalyst, co-led by Human Capital, and with...
Chris Wysopal is the founder and CTO of Veracode. Two decades ago, he was better known as Weld Pond, a member of the hacker...
New report provides a detailed look into the ever-changing threats targeting APIs.
New macOS malware, tracked by Jamf as ObjCShellz, is likely being used by North Korean hackers to target crypto exchanges
Secure-by-design is clearly important to the federal government, and there is a strong possibility that it will become a regulatory requirement for the critical...
Are whistleblowers traitors to the company, a danger to corporate brand image, and a form of insider threat? Or are they an early warning...
The Rise of AI in Phishing: Will future phishing attacks that leverage artificial intelligence be more dangerous?
The feared ‘cryptopocalypse’ (the death of current encryption) might be sooner than expected – caused by in-memory computing ASICs rather than quantum computers.
How much do CISOs make? Survey provides compensation trends for Chief Information Security Officers, but don't take surveys at full face value.
The war with Hamas will inevitably absorb manpower and focus from the cybersecurity sector.
SecurityWeek continues its Hacker Conversations series in a discussion with Natalie Silvanovich, a member of of Google's Project Zero.
The Zero Day Initiative (ZDI) will host a new Automotive Pwn2Own at the Automotive World Conference in Tokyo, January 24 to 26, 2024.
Sysdig enhanced its existing CNAPP offering with a cloud attack graph, risk prioritization, attack path analysis, a searchable inventory, and complete agentless scanning.
CISO churn is a hidden cybersecurity threat. Major security initiatives or implementations can take longer than the residency of a single CISO, and constant...
Venafi launched a proprietary generative AI model to help with the mammoth, complex, and expanding problem of managing machine identities.
SecurityWeek interviews Casey Ellis, founder, chairman and CTO at Bugcrowd, best known for operating bug bounty programs for organizations.
A silicon root of trust (S-RoT) is designed to provide security to those parts of a device that can be attacked by a third...