Google Cloud Users Can Now Automate TLS Certificate Lifecycle

Google on Thursday announced the availability of its Automatic Certificate Management Environment (ACME) API for all…

Watch Now: Threat Detection and Incident Response Virtual Summit

All sessions from SecurityWeek’s Threat Detection & Incident Response Summit  are now available to watch on demand. This…

New Russia-Linked CosmicEnergy ICS Malware Could Disrupt Electric Grids

Mandiant on Thursday detailed a new piece of malware that appears to be linked to Russia…

New BrutePrint Attack Lets Attackers Unlock Smartphones with Fingerprint Brute-Force

Researchers have discovered an inexpensive attack technique that could be leveraged to brute-force fingerprints on smartphones…

AceCryptor: Cybercriminals’ Powerful Weapon, Detected in 240K+ Attacks

A crypter (alternatively spelled cryptor) malware dubbed AceCryptor has been used to pack numerous strains of malware since…

3 Challenges in Building a Continuous Threat Exposure Management (CTEM) Program and How to Beat Them

If you’re a cybersecurity professional, you’re likely familiar with the sea of acronyms our industry is…

Don’t Click That ZIP File! Phishers Weaponizing .ZIP Domains to Trick Victims

A new phishing technique called “file archiver in the browser” can be leveraged to “emulate” a…

Barracuda Discloses Breach Of Some Email Security Customers Due To Zero-Day Vulnerability

Barracuda said that some Email Security Gateway customers were impacted by a breach last week that…

Qualys CEO: CISOs Are Now More Engineering Oriented, Less About Compliance

According to a research report by security vendor Qualys, on average, a software vulnerability in 2022…


TCS Expands Google Cloud Relationship With Vertex Generative AI

‘What is really special is the fact that we are bringing the best from Google and…