A new version of the LockBit ransomware offers a bug bounty, women uninstall period-tracking apps in fear of how their data might be used against them,...
Month: June 2022
Article 5? It’s complicated. Influence ops for economic advantage. SOHO routers under attack. YTStealer described. RansomHouse hits AMD. A NetWalker affiliate cops a plea.
NATO’s response to Killnet’s cyberattacks on Lithuania. Influence operations in the interest of national market share. SOHO routers are under attack. YTStealer is out and active...
Uncategorized
SPHERE SESSION | Carole Cadwalladr on threats to democracy
TED speaker and Pulitzer-nominated journalist Carole Cadwalladr joined us in our cyber sauna recording booth at SPHERE22, the world’s first co-security unconference, for a discussion about...
bleepingcomputer – LockBit 3.0 introduces the first ransomware bug bounty program
The LockBit ransomware operation has released ‘LockBit 3.0,’ introducing the first ransomware bug bounty program and leaking new extortion tactics and Zcash cryptocurrency payment options. The...
Gartner Unveils the Top Eight Cybersecurity Predictions for 2022-23
Analysts Explore the Future of Cybersecurity at the Gartner Security & Risk Management Summit, June 21-22 in Sydney Executive performance evaluations will be increasingly linked to...
CISO Cyber Resources Library CISO2CISO Cyber Security Advisors CISO2CISO Notepad 2 CISO2CISO Notepad Series Cyber Security Papers Global
Good practices for security OIT by enisa
This ENISA study introduces good practices for IoT security, with a particular focus on softwaredevelopment guidelines for secure IoT products and services throughout their lifetime.Establishing secure...