The Website Planet research team, in cooperation with security researcher Jeremiah Fowler, discovered a non-password protected database that contained just under one billion records. The exposed records revealed usernames, display names, and emails for WordPress accounts.
Nearly all (94%) of security and business decision-makers in the Interos Global Supply Chain Report study reported some negative impact to revenue resulting from supply chain disruption, which they attributed to a variety of supply chain risks including cyber breaches, financial risks, and ESG (environment, social, governance) transparency issues.
Eclypsium has discovered four vulnerabilities that impact 128 Dell device models, and an estimated 30 million individual devices, that allow threat actors to remotely execute code in a pre-boot environment, according to new research released today.
New consumer privacy laws and innovative fraudsters have given security professionals much to do in a supercharged digital economy. As our digital footprints widen, bad actors are finding increasingly sophisticated ways to access troves of personal information and sensitive data.
Lamont Orange, Netskope's Chief Information Security Officer (CISO), talks to Security magazine about how to foster a security-first culture with Security Access Service Edge (SASE) adoption.
In an effort to counter the often pernicious effect of biases in artificial intelligence (AI) that can damage people’s lives and public trust in AI, the National Institute of Standards and Technology (NIST) is advancing an approach for identifying and managing these biases — and is requesting the public’s help in improving it.
The Department of Homeland Security (DHS) Cybersecurity and Infrastructure Security Agency (CISA) says the 2020 SolarWinds supply chain cybersecurity compromise could have been prevented with a decade-old security recommendation.
Nick Heywood, Associate Vice President at Guidepost Solutions, talks to Security magazine about the physical, environmental, and cybersecurity issues behind long-empty offices that are reopening as restrictions lift.
USB-based threats that can severely impact business operations increased significantly during a disruptive year when the usage of removable media and network connectivity also grew, according to a report by Honeywell.