サクサク読めて、アプリ限定の機能も多数!
トップへ戻る
アメリカ大統領選
www.infosecurity-magazine.com
More than a third (38%) of employees share sensitive work information with AI tools without their employer’s permission, according to new research by CybSafe and the National Cybersecurity Alliance (NCA). The report found that this behavior was particularly prominent among younger generations. Around half (46%) of Gen Z and 43% of millennials surveyed admitted sharing sensitive work information wi
NIST Scraps Passwords Complexity and Mandatory Changes in New Guidelines Using a mixture of character types in your passwords and regularly changing passwords are officially no longer best password management practices according to new guidelines published by the US National Institute of Standards and Technology (NIST). In NIST’s latest version of its Password Guidelines, the leading security stan
Malicious npm Packages Used to Target GitHub Developer SSH Keys Security researchers have uncovered two new malicious packages on the npm open source package manager that utilized GitHub to store stolen Base64-encrypted SSH keys taken from developer systems. These packages, identified earlier this month, have since been removed from npm. According to a ReversingLabs report published today, this di
Twitter Mentions More Effective Than CVSS at Reducing Exploitability Monitoring Twitter mentions of vulnerabilities may be twice as effective as CVSS scores at helping organizations prioritize which bugs to patch first, according to new research. Kenna Security’s latest report, Prioritization to Prediction, Volume 8: Measuring and Minimizing Exploitability, was compiled with help from the Cyentia
Security researchers are urging Docker customers to upgrade to the latest version after detailing a proof-of-concept (PoC) attack exploiting a critical vulnerability, which could lead to full container escape. The CVE-2019-14271 flaw was fixed in Docker version 19.03.1, but if left unpatched could give an attacker full root code execution on the host. “The vulnerability can be exploited, provided
US Joins with EU, Japan Against China's Vendor Source Code Plan China is going through with a plan to force foreign technology vendors that supply Chinese banks to fork over intellectual property like proprietary source code and adopt Chinese encryption algorithms. But the U.S. said that it wouldn’t back down on pressuring the nation to go in a different direction. The United States has joined for
Pro-Russian Hacktivists Target South Korea as North Korea Joins Ukraine War 8 Nov 2024South Korea warned that pro-Russian groups have attacked government and private sector websites following the deployment of North Korean soldiers in Ukraine Major Oilfield Supplier Hit by Ransomware Attack8 Nov 2024International energy solution provider Newpark Resources has confirmed it was hit by a ransomware a
Don’t miss out! Subscribe to our weekly newsletter for the latest in industry news, expert insights, dedicated information security content and online events.
このページを最初にブックマークしてみませんか?
『Infosecurity Magazine - Strategy, Insight, Technology』の新着エントリーを見る
j次のブックマーク
k前のブックマーク
lあとで読む
eコメント一覧を開く
oページを開く