Microsoft realizes it hasn't updated list of banned dodgy Windows 10 drivers in yearsHope no one was relying on that to block threats, er, yeah? Microsoft...
Day: November 1, 2022
New Year, new cyber security career
New Year, new cyber security careerSay hello to SANS 2023 training events and the new job that will inevitably follow Sponsored Post The turn of the...
Cisco AnyConnect Windows client under active attack
Cisco AnyConnect Windows client under active attackMake sure you're patched – and update VMware Cloud Foundation, too, by the way Cisco says miscreants are exploiting two...
The Mirage of Mandiant: Post-Acquisition Follow-Up
The Mirage of Mandiant: Post-Acquisition Follow-UpRevisiting the strategic implications of Google Cloud and Mandiant following the Google Cloud Next conference. The post The Mirage of Mandiant:...
Unofficial Patch Released for New Actively Exploited Windows MotW Vulnerability
Unofficial Patch Released for New Actively Exploited Windows MotW VulnerabilityAn unofficial patch has been made available for an actively exploited security flaw in Microsoft Windows that...
Feds accuse Ukrainian of renting out PC-raiding Raccoon malware to fiends
Feds accuse Ukrainian of renting out PC-raiding Raccoon malware to fiendsSeparately, charges slapped on alleged operator of dark market, The Real Deal Mark Sokolovsky, 26, a...
Japan to citizens: Get a digital ID or health insurance gets harder
Japan to citizens: Get a digital ID or health insurance gets harderRisk of death is certainly one way to get the populace on board Japan's plan...
Fodcha DDoS Botnet Resurfaces with New Capabilities
Fodcha DDoS Botnet Resurfaces with New CapabilitiesThe threat actor behind the Fodcha distributed denial-of-service (DDoS) botnet has resurfaced with new capabilities, researchers reveal. This includes changes...
Pro-China crew ramps up disinfo ahead of US midterms. Not that anyone’s falling for it
Pro-China crew ramps up disinfo ahead of US midterms. Not that anyone's falling for itHey, Xi, 滚开 The prolific pro-Beijing Dragonbridge crew has apparently stepped up...
Tips for Choosing a Pentesting Company
Tips for Choosing a Pentesting CompanyIn today's world of automated hacking systems, frequent data breaches and consumer protection regulations such as GDPR and PCI DSS, penetration...
Purpleurchin cryptocurrency miners spotted scouring free GitHub, Heroku accounts
Purpleurchin cryptocurrency miners spotted scouring free GitHub, Heroku accountsThis is why we can't have nice things A stealthy cryptocurrency mining operation has been spotted using thousands...
The point solution IAM evolution under reform
The point solution IAM evolution under reformA consolidation of IAM tools, suppliers and managed services providers is changing the default approach Sponsored Feature The inexorable pace...
Biden now wants to toughen up chemical sector’s cybersecurity
Biden now wants to toughen up chemical sector's cybersecurityControl panels facing the internet? Data stolen? You gotta keep an ion this stuff The White House is...
The top cloud cyber security threats unpacked
The top cloud cyber security threats unpackedOur webinar offers practical advice on how to ward off cloud-borne bugs of the digital variety Webinar The cloud is...
Federal bans aren’t stopping US states from buying forbidden Chinese kit
Federal bans aren't stopping US states from buying forbidden Chinese kitReport claims thousands of orgs are still happily writing checks Only a "handful" of US states...
Indian government creates body with power to order social media content takedowns
Indian government creates body with power to order social media content takedownsPLUS: China’s digital currency surges; Infosys tax portals wobble again; Singapore crypto protections; and more...
Undisclosed OpenSSL vulnerability: Free scripts for target scoping
Undisclosed OpenSSL vulnerability: Free scripts for target scoping Tomorrow is “patch Tuesday” and it's a notable one. The OpenSSL project team announced last week that they...
This Windows worm evolved into slinging ransomware. Here’s how to detect it
This Windows worm evolved into slinging ransomware. Here's how to detect itRaspberry Robin hits 1,000 orgs in just one month Raspberry Robin, a worm that spreads...
Singapore hosts ICS/OT cybersecurity training extravaganza
Singapore hosts ICS/OT cybersecurity training extravaganzaTwo great SANS events for APAC cyber security professionals to boost their ICS knowledge and skills Sponsored Post Cybercriminals generally respect...
Psychotherapy extortion suspect: arrest warrant issued
Psychotherapy extortion suspect: arrest warrant issuedWanted! Not only the extortionist who abused the data, but also the CEO who let it happen.Leer másNaked SecurityWanted! Not only...
How Does a Browser Trust a Certificate?
How Does a Browser Trust a Certificate?How Does a Browser Trust a Certificate? Scott Carter Mon, 10/31/2022 - 17:00 6490 views Browsers prevent this type of...
Apple patches actively exploited iPhone, iPad kernel vulns
Apple patches actively exploited iPhone, iPad kernel vulnsPlus: Misconfigured server leaks Thomson Reuters data; VMware patches critical flaw in retired software; MalwareBytes apologies for a hoodie...
Safeguards Rule: 9 Steps to Compliance for Auto Dealerships
Safeguards Rule: 9 Steps to Compliance for Auto DealershipsAutomobile dealerships collect and store large amounts of consumer data, including Social Security numbers, bank account information, and...
The White House’s global ransomware summit couldn’t come at a better time
The White House's global ransomware summit couldn't come at a better timeAs cyber threats ramp up, businesses and organizations will be hoping for more than platitudes...
Ordinary web access request or command to malware?
Ordinary web access request or command to malware?Cranefly group unleashes nasty little technique using Microsoft Internet Information Services (IIS) logs A threat group that targets corporate...
CISA releases cybersecurity performance goals to reduce risk and impact of adversarial threats
CISA releases cybersecurity performance goals to reduce risk and impact of adversarial threatsLast week, the US Cybersecurity and Infrastructure Security Agency (CISA) released voluntary cross-sector Cybersecurity...
Nearly a Third of Cybersecurity Leaders Considering Quitting
Nearly a Third of Cybersecurity Leaders Considering QuittingResearch commissioned by BlackFog shows that work life balance is most disliked part of the job for cybersecurity leaders....
Education tech giant gets an F for security after sensitive info on 40 million users stolen
Education tech giant gets an F for security after sensitive info on 40 million users stolenChegg it out: Four blunders in four years Sloppy data security...
India’s Home Ministry cracks down on predatory lending apps following suicides
India's Home Ministry cracks down on predatory lending apps following suicidesLocal media say they're China backed, Ministry only mentions organized crime India's Home Ministry has asked...
Unofficial fix emerges for Windows bug abused to infect home PCs with ransomware
Unofficial fix emerges for Windows bug abused to infect home PCs with ransomwareBroken code signature? LGTM, says Microsoft OS A cybersecurity firm has issued another unofficial...