Manual Vs. SSPM: Streamlining SaaS Security Management An interesting trend is unfolding in companies around the globe. They are investing in a growing number of SaaS...
Day: November 10, 2022
Thousands of Sites Hacked in Massive Google SEO Poisoning Campaign
Thousands of Sites Hacked in Massive Google SEO Poisoning CampaignThis week, almost 15,000 sites were compromised during a massive black hat search engine optimization (SEO) campaign....
Couple Get 40 Years for Navy Espionage Plot
Couple Get 40 Years for Navy Espionage PlotDuo tried to sell secrets of nuclear propulsionLeer másDuo tried to sell secrets of nuclear propulsion
Outlook and Thunderbird Accounts Threatened by StrelaStealer
Outlook and Thunderbird Accounts Threatened by StrelaStealerOutlook and Thunderbird accounts are being targeted by a new info stealer malware known as StrelaStealer. The malware behaves as most...
PCI DSS 4.0 is coming: how to prepare for the looming changes to credit card payment rules
PCI DSS 4.0 is coming: how to prepare for the looming changes to credit card payment rulesFor enterprises that handle credit card data, which means just...
Malware Redirects 15,000 Sites in Malicious SEO Campaign
Malware Redirects 15,000 Sites in Malicious SEO CampaignCampaign designed to improve search engine rankings of spammy sitesLeer másCampaign designed to improve search engine rankings of spammy...
Surveillance vendor exploited Samsung phone zero-days
Surveillance vendor exploited Samsung phone zero-daysGoogle Project Zero researchers reported that a surveillance vendor is using three Samsung phone zero-day exploits. Google Project Zero disclosed three...
10 common security mistakes and how to avoid them
10 common security mistakes and how to avoid themDo you make these security mistakes and put yourself at greater risk for successful attacks? The post 10...
Some 98% of Global Firms Suffer Supply Chain Breach in 2021
Some 98% of Global Firms Suffer Supply Chain Breach in 2021Two-fifths still trust suppliers to handle their own securityLeer másTwo-fifths still trust suppliers to handle their...
Lenovo warns of flaws that can be used to bypass security features
Lenovo warns of flaws that can be used to bypass security featuresLenovo fixed two high-severity flaws impacting various laptop models that could allow an attacker to...
APT29 abused the Windows Credential Roaming in an attack against a diplomatic entity
APT29 abused the Windows Credential Roaming in an attack against a diplomatic entityRussia-linked APT29 cyberespionage group exploited a Windows feature called Credential Roaming to target a...
Test delete post – 10-11
Test delete post – 10-11This is test data lorem ipsum… This is test data lorem ipsum.. This is test data lorem ipsum.. This is test data...
Social Media Influencer Sentenced to 11 Years in Prison for Cyber Fraud
Social Media Influencer Sentenced to 11 Years in Prison for Cyber Fraud‘Ray Hushpuppi’, an Instagram celebrity, was sentenced to 11 years in jail for conspiring to...
Don’t Get Caught Offsides with These World Cup Scams
Don’t Get Caught Offsides with These World Cup Scams Authored by: Christy Crimmins and Oliver Devane Football (or Soccer as we call it in the U.S.)...
Medibank warns customers their data was leaked by ransomware gang
Medibank warns customers their data was leaked by ransomware gangAustralian health insurance giant Medibank has warned customers that the ransomware group behind last month's breach has started...
Private Information of Thousands of COVID-19 Patients Exposed in Resileo Leak
Private Information of Thousands of COVID-19 Patients Exposed in Resileo LeakA leak that exposed the private information of thousands of COVID-19 patients was discovered on Resileo’s...
Top 6 multi-cloud security solution providers of 2022
Top 6 multi-cloud security solution providers of 2022If you're in the process of constructing a multi-cloud security plan, these providers can help you avoid the most...
15,000 sites hacked for massive Google SEO poisoning campaign
15,000 sites hacked for massive Google SEO poisoning campaignHackers are conducting a massive black hat search engine optimization (SEO) campaign by compromising almost 15,000 websites to...
Secure Shadow IT
Secure Shadow ITAn astonishing 98% of cloud services are adopted without any IT oversight. And when your employees act as their own tech professionals to use...
Smashing Security podcast #297: Mastodon 101, and the Hushpuppi saga
Smashing Security podcast #297: Mastodon 101, and the Hushpuppi sagaGraham offers some security and privacy advice for those exodusing Twitter to Mastodon, and Carole slams the...
Test post without VPN – 10-11
Test post without VPN – 10-11 Test post without VPN – 10-11 Test post without VPN – 10-11 Test post without VPN – 10-11 Test post...
New hacking group uses custom ‘Symatic’ Cobalt Strike loaders
New hacking group uses custom 'Symatic' Cobalt Strike loadersA previously unknown Chinese APT (advanced persistent threat) hacking group dubbed 'Earth Longzhi' targets organizations in East Asia,...
How Modern Security Teams Fight Today’s Cyber Threats (previously known as Plight of Modern Security Teams)
How Modern Security Teams Fight Today’s Cyber Threats (previously known as Plight of Modern Security Teams)This ebook can help security and IT professionals quickly deploy cloud-based...
Zero Trust at Scale eBook
Zero Trust at Scale eBookZero Trust at Scale will provide you with an insider’s lens into this five-month Zero Trust security metamorphosis, helping you to better...
Couple sentenced to prison for trying to sell nuclear warship secrets
Couple sentenced to prison for trying to sell nuclear warship secretsA Navy nuclear engineer and his wife were sentenced to over 19 years and more than...
Two-Factor Authentication Evaluation Guide
Two-Factor Authentication Evaluation GuideIn this guide, you will learn how to evaluate a solution based on: Security Impact – Does the solution reduce risks, and can...
Cloud Security Comparison Guide
Cloud Security Comparison Guide“In 2021, securing your network is more challenging than ever – you need to secure users, devices, apps, and data at the point...
New ransomware tactics include intermittent encryption, IABs
New ransomware tactics include intermittent encryption, IABsBy Zac Amos, Features Editor, Rehack.com. Ransomware is evolving with intermittent encryption, IABs (initial access brokers), and other new technologies that...
New StrelaStealer malware steals your Outlook, Thunderbird accounts
New StrelaStealer malware steals your Outlook, Thunderbird accountsA new information-stealing malware named 'StrelaStealer' is actively stealing email account credentials from Outlook and Thunderbird, two widely used...
The trendiest buzzword in cyber security right now…
The trendiest buzzword in cyber security right now…EXECUTIVE SUMMARY: Moving to a more agile and resilient business model is challenging for many organizational leaders. In the...





















