Building on its broad security portfolio, Microsoft’s new exposure management is now available in the Microsoft Defender portal, with third-party connectors on the way.
Автор: Jeffrey Schwartz, Contributing Writer
Sophos-SecureWorks Deal Focuses on Building Advanced MDR, XDR Platform
Sophos CEO Joe Levy says $859 million deal to acquire SecureWorks from majority owner Dell Technologies will put the Taegis platform — with network detection and response, vulnerability detection and response, and identity threat detection and response…
Dragos Expands ICS Platform with New Acquisition
The addition of Network Perception will provide Dragos with enhanced network visibility, compliance and segmentation analytics to the Dragos OT cybersecurity platform.
6 Cybersecurity Headaches Sports Organizations Have to Worry About
Leaders in professional athletics lament the realities and risks of growth in connected stadium environments, social networks, and legalized gambling.
Mastercard’s Recorded Future Deal Furthers its AI Security Goals
Mastercard’s $2.65 billion deal to acquire the threat intelligence provider will boost the credit card company’s AI-based cybersecurity protection capabilities.
Check Point, Cisco Boost AI Investments with Latest Deals
Cisco’s deal to acquire Robust Intelligence will make it possible to use red team algorithms to assess risk in AI models and applications, while Check Point’s acquisition of Cyberint will add threat intelligence to its SOC platform.
NIST Releases 3 Post-Quantum Standards, Urges Orgs to Start PQC Journey
Security experts welcomed the long-anticipated publication of the first post-quantum cryptographic standards as a significant milestone.
NIST Releases 3 Post-Quantum Standards, Urges Orgs to Start PQC Journey
Security experts welcomed the long-anticipated publication of the first post-quantum cryptographic standards as a significant milestone.
How to Weaponize Microsoft Copilot for Cyberattackers
At Black Hat USA, security researcher Michael Bargury released a "LOLCopilot" ethical hacking module to demonstrate how attackers can exploit Microsoft Copilot — and offered advice for defensive tooling.
Critical AWS Vulnerabilities Allow S3 Attack Bonanza
Researchers at Aqua Security discovered the "Shadow Resource" attack vector and the "Bucket Monopoly" problem, where threat actors can guess the name of S3 buckets based on their public account IDs.