With the number of zero-days spiking in the last 18 months, organisations need to increase patching efforts. Software vendors can be more transparent, too.
Investigations into both cyber criminal and nation-state actors can have consequences. Some researchers have upgraded their physical security.
Malware targeting Linux environments has increased massively in the past year, with threat actors using a variety of techniques to carry out operations.
Job postings that suggest a frat house mindset, work-life imbalance, and pay gaps are among the areas companies should focus on if they want to hire and keep more women cybersecurity professionals.
Attackers constantly search public code repositories like GitHub for secrets developers might inadvertently leave behind, and any tiny mistake can be exploited.
Better logs make it easier to distinguish between critical data and noise. Here's how to design logs with security in mind.
APT groups are developing new techniques that allow them to avoid detection and exfiltrate hundreds of gigabytes of data from Microsoft apps.
The number of attacks carried out using the popular suite has increased in the past two years as browsers become harder targets.