IdentityDell says names, addresses leaked after hacker claims access to 49M recordsLaura FrenchMay 10, 2024Dell began notifying customers this week after database records surfaced on a cybercrime forum.
Cloud SecurityGoogle patches fifth Chrome zero-day of 2024Steve ZurierMay 10, 2024While Google confirmed that the bug exists in the wild, security researchers say there has yet to have been an instance of active exploitation.
Network SecurityCybersecurity incident impacts operations at Ascension hospitalsSteve ZurierMay 9, 2024Large Catholic nonprofit hired Mandiant to investigate what’s now an unspecified cybersecurity incident that has reportedly forced hospitals in at least Maryland, Michigan, Kansas, and Wisconsin to shut down its systems.
RSACRSAC 2024: Top cyber insurance trends, traps and adviceTom Spring May 9, 2024A panel of experts unpack the art of cyber insurance here at RSA Conference and share what's new in coverage and claims.
RSACRSAC 2024: Securing ‘fragmented’ identities in the cloud ageLaura FrenchMay 8, 2024Zero trust, access certification campaigns and regular AD risk assessments are more critical than ever.
Network Security‘TunnelVision’ DHCP flaw lets attackers bypass VPNs, redirect trafficSteve ZurierMay 8, 2024Security pros warn that this flaw could affect just about every IP-routing based VPN.
RSACRSAC 2024: CISA, DHS grapple with cyber risks in the age of AILaura FrenchMay 8, 2024AI and “secure by design” will be crucial to defend against ransomware, CI attacks and AI threats in the coming years.
RSACRSAC 2024: Outfoxing SSO: Bypassing modern authenticationTom Spring May 7, 2024Identity security firm Silverfort shows how an adversary could bypass FIDO2 protections and SSO to hijack a session token for abuse.
RansomwareLaw enforcement indicts mastermind behind LockBit ransomware gangSteve ZurierMay 7, 2024Security pros say the move by law enforcement puts a significant dent into LockBit.
RSACRSAC 2024: AI adds new dimension to virus detectionLaura FrenchMay 7, 2024Large language models (LLM) provide context that could expose overlooked threats.