15 Companies Make Up 62% of Global Attack Surface
The growing concentration of cyber risk and the escalating exploitation of third-party vulnerabilities present a significant threat to national security and the global economy.
The growing concentration of cyber risk and the escalating exploitation of third-party vulnerabilities present a significant threat to national security and the global economy.
The Cybersecurity and Infrastructure Security Agency (CISA) has announced that 68 top software manufacturers have voluntarily committed to CISA’s Secure by Design pledge. These software manufacturers have pledged to make measurable progress towards seven specific goals to enhance the security of critical infrastructure. The seven goals outlined in this commitment, to be achieved within a […]
A report by the Ponemon Institute found that 59% of organizations experienced a software supply chain attack, with 54% of these respondents having experienced one in the past year. This survey was conducted among 1,278 IT and IT security practitioners, with managers, directors and senior executives making up nearly half (49%) of the survey demographic. […]
Invicti recently launched its Predictive Risk Scoring feature, which is a groundbreaking industry first that can generate accurate security risk predictions before vulnerability scanning even begins. To learn more, visit Predictive Risk Scoring for details. This feature utilizes a custom-built machine learning model trained on real-world vulnerability data (excluding customer data) that is operated internally […]
A recent report by Cofense delves into the intricate details of a sophisticated phishing campaign designed to circumvent multi-factor authentication (MFA) in order to target Meta business accounts. The report uncovers the existence of a cybercrime toolkit that enables malicious actors to craft links, emails, and other deployable tools. This campaign is currently capable of […]
A recent report by ReasonLabs analyzed cybersecurity and threat intelligence. The report revealed that malware accounted for nearly 50% of global detections in Q1 of this year, with Adware and Phishing detections following closely. In the U.S., phishing detections were most prevalent at over 56%, with Malware and Adware detections following behind. The report also […]
A global consumer research study by Jumio reveals consumer attitudes about generative AI and deepfakes. This study surveyed 8,000 adult consumers from the United States, the United Kingdom, Singapore and Mexico, with 2,000 respondents from each listed country. A notable finding from the report is that a majority of consumers (72%) have concerns each day […]
The Federal Trade Commission (FTC) has mandated that Cerebral, Inc. limit its use and disclosure of sensitive consumer data and provide consumers with an easy way to cancel services. The order aims to resolve FTC allegations that the telehealth company failed to adequately protect sensitive health data. As per the proposed order filed by the […]
Modern application security must be built in from the outset and reinforced continually throughout the software development lifecycle. Even organizations with mature application development practices need automated tools to successfully and repeatably secure their software in complex, fast-changing environments. Security leaders commonly focus on ensuring software security through runtime protection measures, with major cloud service […]
IANS Research has published a report that delves into tech CISO compensation, mobility, and job satisfaction. The report also examines the size of security budgets in tech companies. The data for the report was gathered from a survey of 660 CISOs, with 149 of them working in the tech industry. The report provides insights into […]