SearchSecurity

New & Notable

News

Risk & Repeat: Uber and Rockstar Games hacked

This podcast episode discusses recent hacks against Uber and Rockstar Games, the techniques of the attackers and the possible connection to the Lapsus$ cybercrime group.

Evaluate

10 security-by-design principles to include in the SDLC

Security is rarely a priority in the SDLC, but it should be. Adhere to these security-by-design principles for secure software and learn the importance of threat modeling.

News

15-year-old Python vulnerability poses supply chain threat

Trellix researchers issued a call for help to patch a vulnerable software module, which was found in more than 300,000 open source GitHub repositories.

News

Cybercriminals launching more MFA bypass attacks

New research from Okta shows that cybercrime groups have stepped up their attacks on multifactor authentication systems in an effort to thwart account security measures.

Find Solutions For Your Project

Pro+ Security Downloads

View All

Information Security Basics

View All Get Started

Multimedia

Videos, Podcasts, Photo Stories and Infographics

Sections from across SearchSecurity

SearchNetworking
SearchCIO
SearchEnterpriseDesktop
SearchCloudComputing
ComputerWeekly.com
Close