New report provides a detailed look into the ever-changing threats targeting APIs.
Hi, what are you looking for?
New report provides a detailed look into the ever-changing threats targeting APIs.
New macOS malware, tracked by Jamf as ObjCShellz, is likely being used by North Korean hackers to target crypto exchanges
Secure-by-design is clearly important to the federal government, and there is a strong possibility that it will become a regulatory requirement for the critical...
Are whistleblowers traitors to the company, a danger to corporate brand image, and a form of insider threat? Or are they an early warning...
The Rise of AI in Phishing: Will future phishing attacks that leverage artificial intelligence be more dangerous?
The feared ‘cryptopocalypse’ (the death of current encryption) might be sooner than expected – caused by in-memory computing ASICs rather than quantum computers.
How much do CISOs make? Survey provides compensation trends for Chief Information Security Officers, but don't take surveys at full face value.
The war with Hamas will inevitably absorb manpower and focus from the cybersecurity sector.
SecurityWeek continues its Hacker Conversations series in a discussion with Natalie Silvanovich, a member of of Google's Project Zero.
The Zero Day Initiative (ZDI) will host a new Automotive Pwn2Own at the Automotive World Conference in Tokyo, January 24 to 26, 2024.
Sysdig enhanced its existing CNAPP offering with a cloud attack graph, risk prioritization, attack path analysis, a searchable inventory, and complete agentless scanning.
CISO churn is a hidden cybersecurity threat. Major security initiatives or implementations can take longer than the residency of a single CISO, and constant...