Category: EN

CISO role in ASM could add runtime security, tokenization

<p>Attack surface management is a sprawling <a href=”https://www.techtarget.com/searchsecurity/definition/cybersecurity”>cybersecurity</a> field that aims to identify internal and external vulnerabilities, recommend countermeasures and watch for emerging threats. Enterprises looking to shore up the attack surface can deploy numerous <a href=”https://www.techtarget.com/searchsecurity/tip/What-is-attack-surface-management-and-why-is-it-necessary”>ASM</a> tools that scan,…

Anne Arundel Dermatology data breach impacts 1.9 million people

Hackers breached Anne Arundel Dermatology systems for three months, potentially exposing personal and health data of 1.9 million people. Anne Arundel Dermatology is a physician-owned and managed dermatology group headquartered in Maryland, founded over 50 years ago. It’s one of…

NailaoLocker Ransomware’s “Cheese”

FortiGuard Labs analyzes NailaoLocker ransomware, a unique variant using SM2 encryption and a built-in decryption function. Learn how it works, why it matters, and how Fortinet protects against it.        This article has been indexed from Fortinet Threat Research Blog…

Russia Linked to New Malware Targeting Email Accounts for Espionage

Russian military intelligence-linked hackers are using a new malware called “Authentic Antics” to secretly access Microsoft cloud email accounts, the UK’s NCSC reports This article has been indexed from www.infosecurity-magazine.com Read the original article: Russia Linked to New Malware Targeting…

WAFFLED: New Technique Targets Web Application Firewall Weaknesses

Cybersecurity researchers at Northeastern University and Dartmouth College have unveiled a groundbreaking attack technique that exploits fundamental parsing discrepancies in Web Application Firewalls (WAFs), potentially compromising the security of millions of websites worldwide. The research, dubbed “WAFFLED” (Web Application Firewall…

5 Features Every AI-Powered SOC Platform Needs in 2025

A modern AI-based SOC platform must adapt in real time to handle alert overloads and fast-moving threats, surpassing traditional SIEM tools. Modern security operations centers (SOCs) are under immense pressure. Analysts are overwhelmed, alert queues are overflowing, and attackers are…