The more that you read, the more things you will know. The more that you learn, the more places you’ll go. Dr. Seuss The books are...
Day: August 27, 2022
INFORME SOBRE LA CIBERCRIMINALIDAD EN ESPAÑA POR SISTEMA ESTADISTICO DE CRIMINALIDAD SEC
Introduccion La Cibercriminalidad como fenómeno complejo y global requiere un enfoque multidisciplinar para abordar cualquier planteamiento de respuesta contra la misma. Para ello, una primera aproximación...
NAVEX enhances RiskRate to simplify third-party self-registration and onboarding processes
NAVEX enhances RiskRate to simplify third-party self-registration and onboarding processesNAVEX has updated RiskRate, its third-party risk screening and monitoring solution. RiskRate’s due diligence is part of...
IT leaders struggling to address identity sprawl
IT leaders struggling to address identity sprawlRadiant Logic unveiled the Identity Data Management: Roadblock or Business Enabler report, providing insights into today’s identity management challenges. Gartner...
How fast is the financial industry fixing its software security flaws?
How fast is the financial industry fixing its software security flaws?Veracode released data revealing that the financial services industry ranks among the best for overall flaw...
How complicated access management protocols have impacted cloud security
How complicated access management protocols have impacted cloud securityDuring AWS re:Inforce, Amazon executives emphasized how important access control is when it comes to cloud security and...
New infosec products of the week: August 26, 2022
New infosec products of the week: August 26, 2022Here’s a look at the most interesting products from the past week, featuring releases from Drata, Ntrinsec, PlainID,...
Nobelium APT uses new Post-Compromise malware MagicWeb
Nobelium APT uses new Post-Compromise malware MagicWebRussia-linked APT group Nobelium is behind a new sophisticated post-exploitation malware tracked by Microsoft as MagicWeb. Microsoft security researchers discovered...
LastPass data breach: threat actors stole a portion of source code
LastPass data breach: threat actors stole a portion of source codePassword management software firm LastPass has suffered a data breach, threat actors have stole source code...
0ktapus phishing campaign: Twilio hackers targeted other 136 organizations
0ktapus phishing campaign: Twilio hackers targeted other 136 organizationsThe threat actors behind Twilio and Cloudflare attacks have been linked to a phishing campaign that targeted other 136 organizations. The...
Gambling sites are losing significant amounts of revenue due to raising DDoS attacks
Gambling sites are losing significant amounts of revenue due to raising DDoS attacksImperva releases data showing that 25% of all gambling sites were hit with DDoS...
GoldDragon campaign: North-Korea linked Kimsuky APT adopts victim verification technique
GoldDragon campaign: North-Korea linked Kimsuky APT adopts victim verification techniqueThe North Korea-linked Kimsuky APT is behind a new campaign, tracked as GoldDragon, targeting political and diplomatic...