Tenable Vulnerability Management Accelerates Security Response with Context-Driven Prioritization

Vulnerability management has been crucial for effective cybersecurity for years. How has it evolved recently to…

CrowdStrike Outage Fallout: 5 New Developments

Matters related to the widely felt July 19 outage caused by a faulty CrowdStrike update have begun shifting…

CrowdStrike Pushes Back Against Delta Legal Threats Over Outage

CrowdStrike is contending that Delta did not accept offers of help amid the multi-day outage that impacted the…

Suspicious Minds: Insider Threats in The SaaS World

Everyone loves the double-agent plot twist in a spy movie, but it’s a different story when…

North Korean Hackers Moonstone Sleet Push Malicious JS Packages to npm Registry

The North Korea-linked threat actor known as Moonstone Sleet has continued to push malicious npm packages to the…

Google Patches New Android Kernel Vulnerability Exploited in the Wild

Google has addressed a high-severity security flaw impacting the Android kernel that it said has been…

This AI-Powered Cybercrime Service Bundles Phishing Kits with Malicious Android Apps

A Spanish-speaking cybercrime group named GXC Team has been observed bundling phishing kits with malicious Android applications, taking…

Microsoft: Windows ‘Clearly’ Needs Better Resilience After CrowdStrike Outage

Microsoft acknowledged that it must “prioritize change and innovation” for Windows following the massive CrowdStrike-caused outage to the…

SentinelOne CEO: Cybersecurity Shouldn’t Require Constant Updates

The unprecedented IT outage caused by a faulty CrowdStrike update a week ago has raised questions about the…

Proofpoint Email Routing Flaw Exploited to Send Millions of Spoofed Phishing Emails

“For CISOs, the main takeaway here is to take extra care of their organization’s cloud posture…