Cyber actors have used credential stuffing bot attacks to obtain and then resell pharmacy account details, giving unauthorized individuals access to prescription drugs.
Amid pandemic disruptions, burnout and geopolitically motivated cyberattacks, what are the challenges faced by security teams? VMware's Global Incident Response Threat Report shines a light on emerging cyber threats.
Part one of this two-part article series examines password spray, credential stuffing, and man-in-the-middle attacks and techniques and tools for mitigation
What are the most prominent identity-based attacks and how are they carried out? And how can security teams leverage identity technologies to mitigate those attacks and reduce their organizational risk?
As Dave Komendat, Vice President and Chief Security Officer at Boeing, prepares to retire this year, he reflects on formative moments that affected him and the lessons he’ll take with him into the next chapter of his career.
Dave Komendat, VP and CSO of Boeing, prepares to retire this year; he sits down with Security magazine to reflect on the formative moments of his career.
The Cybersecurity and Infrastructure Security Agency (CISA) and the Australian Cyber Security Centre (ACSC) have released an advisory on top malware strains in 2021.
Organizations must implement emergency preparedness and critical incident response policies for crisis management in the current security environment. Let's take a look at what a critical incident response plan should include.