Government, Union-Themed Lures Used to Deliver Cobalt Strike PayloadsCisco Talos discovered the malicious campaign in August 2022Leer másCisco Talos discovered the malicious campaign in August 2022
Month: September 2022
Researchers Uncover Covert Attack Campaign Targeting Military Contractors
Researchers Uncover Covert Attack Campaign Targeting Military ContractorsA new covert attack campaign singled out multiple military and weapons contractor companies with spear-phishing emails to trigger a...
Optus breach – Aussie telco told it will have to pay to replace IDs
Optus breach – Aussie telco told it will have to pay to replace IDsLicence compromised? Passport number burned? Need a new one? Who's going to pay?Leer...
Brazilian Prilex Hackers Resurfaced With Sophisticated Point-of-Sale Malware
Brazilian Prilex Hackers Resurfaced With Sophisticated Point-of-Sale MalwareA Brazilian threat actor known as Prilex has resurfaced after a year-long operational hiatus with an advanced and complex malware to...
WhatsApp “zero-day exploit” news scare – what you need to know
WhatsApp “zero-day exploit” news scare – what you need to knowIs WhatsApp currently under active attack by cybercriminals? Is this a clear and current danger? How...
S3 Ep102: Cutting through cybersecurity news hype [Audio + Transcript]
S3 Ep102: Cutting through cybersecurity news hype [Audio + Transcript]Latest episode - listen now! Tell fact from fiction in hyped-up cybersecurity news...Leer másNaked SecurityLatest episode -...
Researchers Discover Chaos, a Golang Multipurpose Botnet
Researchers Discover Chaos, a Golang Multipurpose BotnetThe tool was written in Chinese and seemed China-based due to its C2 infrastructureLeer másThe tool was written in Chinese...
8 mistakes CIOs make and how to avoid them
8 mistakes CIOs make and how to avoid themFrom driving transformative change, to sharing insights into the political nature of the role, IT leaders and advisors...
CloudBees CEO: Software delivery is now ‘release orchestration’
CloudBees CEO: Software delivery is now ‘release orchestration’Enterprise software delivery company CloudBees has a new SaaS offering to discuss, and the firm's CEO gets philosophical. The...
Essential best practices: Securing critical national infrastructure
Essential best practices: Securing critical national infrastructureBy Deryck Mitchelson, Field CISO EMEA, Check Point Software Technologies. Last week, news reports indicated that a European government agency...
The Troublemaker CISO: How Much Profit Equals One Life?
The Troublemaker CISO: How Much Profit Equals One Life?Security Director Ian Keller Rants About Hospital Networks Being Internet-Connected"It's stupid and adds zero value," writes Ian Keller,...
Launch an IT career after taking these eight courses for under $50
Launch an IT career after taking these eight courses for under $50Get a great deal on 110 hours of IT training in these online courses focused...
American Airlines learns breach caused by phishing
American Airlines learns breach caused by phishingEXECUTIVE SUMMARY: The US airline, which reportedly owns the world’s largest fleet of aircraft, has fallen prey to a phishing...
Stronger Cloud Security in Azure Functions Using Custom Cloud Container
Stronger Cloud Security in Azure Functions Using Custom Cloud ContainerIn this entry, we discuss how developers can use custom cloud container image and the distroless approach...
Ever suspected bankers could just use WhatsApp comms? $1.8b says you’re right
Ever suspected bankers could just use WhatsApp comms? $1.8b says you're rightThought shadow IT at your office was bad? Try enforcing workplace device policies on hedge...
Reducing the risk of human error in cyber security
Reducing the risk of human error in cyber securityTips on how to turn a potential weakness into a towering strength Webinar We all make mistakes. Some...
Cyberwar: Assessing the Geopolitical Playing Field
Cyberwar: Assessing the Geopolitical Playing FieldThe United States is arguably involved in a cyberwar against Russia and China - and appears to be losing. In this...
Report finds women are declining CISO/CSO roles
Report finds women are declining CISO/CSO rolesProfessional risk factors into career decisions, and successful women need to encourage other women to accept the risks, says Accenture....
How hardware impacts cyber security
How hardware impacts cyber securityBy Zac Amos, Features Editor, Rehack.com. Cyber security has been an important topic for over two decades, but as data breaches continue to...
Adware installed 13 million times + how to uninstall it
Adware installed 13 million times + how to uninstall itEXECUTIVE SUMMARY: Cyber security researchers have discovered and disrupted a mobile ad fraud campaign involving nearly 100...
Hacker breaches Fast Company, sending offensive notifications
Hacker breaches Fast Company, sending offensive notificationsEXECUTIVE SUMMARY: The business publication known as Fast Company has confirmed that an unauthorized person recently compromised the company’s technology...
Hacked Fast Company sends ‘obscene and racist’ alerts via Apple News
Hacked Fast Company sends 'obscene and racist' alerts via Apple NewsSomeone going by 'Thrax' claims responsibility for 'incredibly easy' breach Apple News shut down Fast Company's...
Fired admin cripples former employer’s network using old credentials
Fired admin cripples former employer's network using old credentialsAn IT system administrator of a prominent financial company based in Hawaii, U.S., used a pair of credentials...
Examining What Went Wrong for Optus
Examining What Went Wrong for OptusThe latest edition of the ISMG Security Report discusses what went wrong for Optus in the wake of one of Australia's...
Remote work security statistics in 2022
Remote work security statistics in 2022By Pete Nicoletti, Field CISO Americas, Check Point Software. After two years of having our businesses and lives impacted by the...
Want to sneak a RAT into Windows? Buy Quantum Builder on the dark web
Want to sneak a RAT into Windows? Buy Quantum Builder on the dark webBeware what could be hiding in those LNK shortcuts A tool sold on...
Live Webinar | Cybersecurity Best Practices for Remoter Workforce
Live Webinar | Cybersecurity Best Practices for Remoter WorkforceContenido de la entradaLeer másDataBreachToday.com RSS Syndication
The web’s cruising at 13 million new and nefarious domain names a month
The web's cruising at 13 million new and nefarious domain names a monthOr so Akamai is dying to tell us Akamai reckons that, in the first...
Pentagon is far too tight with its security bug bounties
Pentagon is far too tight with its security bug bountiesBut overpriced, useless fighter jets? That's something we can get behind Discovering and reporting critical security flaws...
2023: Leveraging Defender and Sentinel
2023: Leveraging Defender and SentinelContenido de la entradaLeer másDataBreachToday.com RSS Syndication