New & Notable

News

VexTrio cybercrime outfit run by legit ad tech firms

New research reveals that a malicious traffic distribution system (TDS) is run not by 'hackers in hoodies,' but by a series of corporations operating in the commercial digital advertising industry.

— Dark Reading

News

'ReVault' security flaws impact millions of Dell laptops

The now-patched vulnerabilities exist at the firmware level and enable deep persistence on compromised systems.

— Dark Reading

News

Critical zero-day bugs crack open CyberArk, HashiCorp password vaults

Secrets managers hold all the keys to an enterprise's kingdom. Two popular ones had longstanding, critical, unauthenticated RCE vulnerabilities.

— Dark Reading

News

U.S. still prioritizing zero-trust migration to limit hacks' damage

The zero-trust initiative, which gained steam during the Biden administration, is still underway.

— Cybersecurity Dive

Find Solutions For Your Project

Information Security Basics

  • Get Started

    What is integrated risk management (IRM)?

    Integrated risk management (IRM) is a set of proactive, businesswide practices that contribute to an organization's security, risk tolerance profile and strategic decisions.

  • Get Started

    What is COMSEC (communications security)?

    Communications security (COMSEC) is the prevention of unauthorized access to telecommunications traffic or to any written information that is transmitted or transferred.

  • Get Started

    What is the Mitre ATT&CK framework?

    The Mitre ATT&CK -- pronounced miter attack -- framework is a free, globally accessible knowledge base that describes the latest behaviors and tactics of cyberadversaries to help organizations strengthen their cybersecurity strategies.

View All Get Started

Multimedia

Videos, Podcasts, Photo Stories and Infographics

Sections from across Search Security