Attackers have their methods timed to the second, and they know they have to get in, do their damage, and get out quickly. CISOs today must detect and block in even less time.Read More HERE
A bug in how Google Cloud Platform handles OAuth tokens opened the door to Trojan apps that could access anything in users’ personal or business Google Drives, Photos, Gmail, and more.Read More HERE
The Open Source Security Foundation’s SLSA v1.0 release is an important milestone in improving software supply chain security and providing organizations with the tools they need to protect their software.Read More HERE
The new Security Legal Research Fund and Hacking Policy Council are aimed at protecting “good faith” security researchers from legal threats and giving them a voice in policy discussions.Read More HERE
Killnet’s leader outs the identity of the new Anonymous Russia leader, in an effort to consolidate power among pro-Russia cybercriminals.Read More HERE
The nation-stage threat group deployed custom malware on archaic versions of Cisco’s router operating system. Experts warn that such attacks targeting network infrastructure are on the rise.Read More HERE