Threats & Breaches
What Makes a Password Weak or Strong?
In today’s digital age, passwords serve as the first line of defense in securing our online accounts. Yet, despite the increasing awareness of cybersecurity threats, many individuals and organizations still fall victim ...
Biden Review Board Gives Microsoft a Big, Fat Raspberry
Storm-0558 forecast: Last year’s Chinese hack of federal agencies’ email is still a mystery, and “should never have occurred,” says CISA ...
NIST Proposes Public-Private Group to Help with NVD Backlog
An embattled National Institute of Standards and Technology (NIST), hobbled by budget cuts, is looking for more help from both inside and outside the government. NIST is trying to manage a growing ...
Picus Security Melds Security Knowledge Graph with Open AI LLM
Picus Security today added an artificial intelligence (AI) capability to enable cybersecurity teams to automate tasks via a natural language interface. The capability, enabled by OpenAI, leverages the existing knowledge graph technologies ...
Prioritizing Cyber Risk: Get a leg up with AI
In the previous blog post, we described how Balbix leverages AI to provide a unified and comprehensive visibility into your attack surface. Establishing it requires deduplicating, normalizing, and correlating data from dozens ...
Sophos: Backups are in Ransomware Groups’ Crosshairs
Enterprises that ignore their data backups, in contemplating ransomware, do so at their own peril, according to cybersecurity firm Sophos. Protecting backups will significantly reduce the harm to a company hit by ...
How to Recover After Failing a Cybersecurity Audit
The post How to Recover After Failing a Cybersecurity Audit appeared first on Digital Defense ...
Lacework Adds Visualization Capabilities to CNAPP
Lacework today added multiple capabilities to its namesake cloud-native application protection platform (CNAPP), promising to make it simpler for security analysts to correlate threats using, for example, graph technology the company developed ...
Top 5 Vulnerabilities for March 2024: A Closer Look at the XZ Utils Supply Chain Attack
March may have roared in like a lion, but for cybersecurity professionals, it was more like a backdoor sneaking into a critical utility. This month, we’ve seen some serious contenders,... The post ...
71% Website Vulnerable: API Security Becomes Prime Target for Hackers
The internet that we use today is a massive network of interconnected devices and services. Application Programming Interfaces (APIs) are an essential but sometimes invisible technology layer that underpins services ranging from ...