Medibank hackers revealed to be in RussiaThe Australian Federal Police has revealed that those responsible for the data breach of Australian private health insurer Medibank are...
Day: November 15, 2022
Twitter C-Level Resignations Continue As Blue Program Creates New Cyber-Risks
Twitter C-Level Resignations Continue As Blue Program Creates New Cyber-RisksThey left quoting concerns about the rollout of new features without an FTC consent decreeLeer másThey left...
GitHub sets up private vulnerability reports for public repos to avoid ‘naming and shaming’
GitHub sets up private vulnerability reports for public repos to avoid 'naming and shaming'No need for ignominy when a flaw is found GitHub is offering a...
Vulnerability Assessment 101
Vulnerability Assessment 101Vulnerabilities are common to any business. And judging by the pace at which threat actors are advancing in their technologies, it is crucial for...
Man Arrested in Ontario For Alleged LockBit Ransomware Involvement
Man Arrested in Ontario For Alleged LockBit Ransomware InvolvementMikhail Vasiliev was apprehended in Canada and is in custody awaiting extradition to the USLeer másMikhail Vasiliev was...
SOAR vs XDR – What Type of Security Approach Benefits Your Organization
SOAR vs XDR – What Type of Security Approach Benefits Your OrganizationIn a previous article, I outlined the pros and cons of SOAR and SIEM solutions,...
How Cisco keeps its APIs secure throughout the software development process
How Cisco keeps its APIs secure throughout the software development processSoftware developers know not to reinvent the wheel. So, they lean on reusable micro-services – and...
Russia-based Pushwoosh tricks US Army and others into running its code – for a while
Russia-based Pushwoosh tricks US Army and others into running its code – for a whileRussian data trackers … what could possibly go wrong? US government agencies...
CISA Releases SSVC Guide to Help Companies Prioritize Vulnerabilities
CISA Releases SSVC Guide to Help Companies Prioritize VulnerabilitiesRemediation efforts are prioritized based on exploitation status, safety impact and prevalence criteriaLeer másRemediation efforts are prioritized based...
Data sovereignty and compliance need help
Data sovereignty and compliance need helpIt’s a critical issue which our poll suggests influences the choice of on and off prem hosting platforms Reader Survey Results ...
Grip Security Blog 2022-11-15 06:32:47
Grip Security Blog 2022-11-15 06:32:47 Why SSCP is Essential for SaaS Security Benefits of SaaS Security Control Plane for SaaS Security For CISOs, security managers, and similar...
French Furnishing Retail Giant Allegedly Hit With Ransomware
French Furnishing Retail Giant Allegedly Hit With RansomwareThe group of hackers ALPHV, also known as BlackCat, claimed to have stolen more than one terabyte of data...
New York-barred attorneys required to complete cybersecurity, privacy, and data protection training
New York-barred attorneys required to complete cybersecurity, privacy, and data protection trainingNew York-barred attorneys will be required to complete one continuing legal education (CLE) credit hour...
IT Leaders Adopting Threat Intelligence, But Challenges Persist
IT Leaders Adopting Threat Intelligence, But Challenges Persist While the majority of enterprise IT security managers rely on threat intelligence to reduce cybersecurity risk, many still...
DNS Logging: What It Is and How Can It Help in Preventing DNS Attacks?
DNS Logging: What It Is and How Can It Help in Preventing DNS Attacks?DNS logging is the process of gathering detailed data on DNS traffic (all...
Ukrainian CERT Discloses New Data-Wiping Campaign
Ukrainian CERT Discloses New Data-Wiping CampaignSomnia malware hijacks Telegram and VPN accountsLeer másSomnia malware hijacks Telegram and VPN accounts
Country that still uses fax machines wants to lead the world on data standards at G7
Country that still uses fax machines wants to lead the world on data standards at G7Aiming for somewhere between US 'Wild West' and EU's strict GDPR...
Chinese Cyberspies Responsible for BadBazaar Android Malware
Chinese Cyberspies Responsible for BadBazaar Android MalwareA spyware tool known as BadBazaar, has been discovered targeting ethnic and religious minorities in China, mainly the Uyghurs in...
UK Shoppers Lost £15m+ to Scammers Last Winter
UK Shoppers Lost £15m+ to Scammers Last WinterCyber experts urge consumers to improve online safetyLeer másCyber experts urge consumers to improve online safety
Build a mature approach for better cybersecurity vendor evaluation
Build a mature approach for better cybersecurity vendor evaluationSeasoned CISO Mike Manrod knows the value of a good cybersecurity vendor evaluation. He recalls that in a...
Microsoft Defender network protection generally available on iOS, Android
Microsoft Defender network protection generally available on iOS, AndroidMicrosoft announced that the Mobile Network Protection feature is generally available to help organizations detect network weaknesses affecting...
New Extortion Scam Threatens Victims with Data Leak
New Extortion Scam Threatens Victims with Data LeakA new extortion scam is aimed at website owners and admins all over the world. The scam claims that...
Mass Email Extortion Campaign Claims Server Hack
Mass Email Extortion Campaign Claims Server HackThreat actors claim they’ll destroy victims' reputation if they don't payLeer másThreat actors claim they’ll destroy victims' reputation if they...
Ukrainian Organizations Infected by Russian Hacktivists
Ukrainian Organizations Infected by Russian HacktivistsA new ransomware strain called Somnia has affected multiple Ukrainian organizations lately, encrypting their systems and causing operational problems. The Computer...
Worok Hackers Abuse Dropbox API to Leak Data via Backdoor Hidden in Images
Worok Hackers Abuse Dropbox API to Leak Data via Backdoor Hidden in ImagesWorok, a newly discovered cyber espionage group, has been hiding malware in seemingly innocuous...
The Week in Ransomware – November 11th 2022 – LockBit feeling the heat
The Week in Ransomware - November 11th 2022 - LockBit feeling the heatThis 'Week in Ransomware' covers the last two weeks of ransomware news, with new...
Australia Considers Ban on Ransomware Payments After Medibank Breach
Australia Considers Ban on Ransomware Payments After Medibank BreachHome affairs minister Clare O'Neil made the announcement on ABC television on SundayLeer másHome affairs minister Clare O'Neil...
Australia Is Forming a Squad for Combating Cyber Threat Groups
Australia Is Forming a Squad for Combating Cyber Threat GroupsIn the previous months, threat actors have been heavily targeting Australian companies, two of the most notorious...
NSA Guide Helps Firms Protect Against Memory Safety Vulnerabilities
NSA Guide Helps Firms Protect Against Memory Safety VulnerabilitiesThe document describes situations where cyber actors steal sensitive information and other negative impactsLeer másThe document describes situations...
Android phone owner accidentally finds a way to bypass lock screen
Android phone owner accidentally finds a way to bypass lock screenCybersecurity researcher David Schütz accidentally found a way to bypass the lock screen on his fully...