LastPass admits to customer data breach caused by previous breachSeems that the developer account that the crooks breached last time gave indirect access to customer data...
Day: December 5, 2022
Number Nine! Chrome fixes another 2022 zero-day, Edge patched too
Number Nine! Chrome fixes another 2022 zero-day, Edge patched tooNinth more unto the breach, dear friends, ninth more.Leer másNaked SecurityNinth more unto the breach, dear friends,...
Apple pushes out iOS security update that’s more tight-lipped than ever
Apple pushes out iOS security update that’s more tight-lipped than everWe grabbed the update, based on no information at all, just in case we came across...
Hackers Use Archive Files and HTML Smuggling to Bypass Detection Tools
Hackers Use Archive Files and HTML Smuggling to Bypass Detection ToolsHP's latest report suggests 44% of malware was delivered via archive files in Q3 2022Leer másHP's...
Medibank prognosis gets worse after more stolen data leaked
Medibank prognosis gets worse after more stolen data leakedPlus Australia launches an investigation into insurer's data privacy practices Australian health insurer Medibank's prognosis following an October...
Ransomware attackers allegedly demand ransom from AIIMS: police deny report
Ransomware attackers allegedly demand ransom from AIIMS: police deny reportA hacker has allegedly demanded Rs 200 crore in cryptocurrency from the All India Institute of Medical...
What is Ransom Cartel? A ransomware gang focused on reputational damage
What is Ransom Cartel? A ransomware gang focused on reputational damageRansom Cartel, a ransomware-as-a-service (RaaS) operation, has stepped up its attacks over the past year after...
Rackspace rocked by ‘security incident’ that has taken out hosted Exchange services
Rackspace rocked by ‘security incident’ that has taken out hosted Exchange servicesWarns recovery could take several days and pledges better support after customer complaints Updated Some...
5 top qualities you need to become a next-gen CISO
5 top qualities you need to become a next-gen CISORansomware and data breaches pose a massive risk to organizations, resulting in loss of customer trust and...
Judge Orders U.S. Lawyer in Russian Botnet Case to Pay Google
Judge Orders U.S. Lawyer in Russian Botnet Case to Pay GoogleIn December 2021, Google filed a civil lawsuit against two Russian men thought to be responsible...
‘Black Proxies’ Enable Threat Actors to Conduct Malicious Activity
'Black Proxies' Enable Threat Actors to Conduct Malicious ActivityFirst used as botnets, their lucrative nature turned them into independent criminal enterprisesLeer másFirst used as botnets, their...
Ping of death! FreeBSD fixes crashtastic bug in network tool
Ping of death! FreeBSD fixes crashtastic bug in network toolIt's a venerable program, and this version had a venerable bug in it.Leer másNaked SecurityIt's a venerable...
US Air Force reveals B-21 Raider stealth bomber that’ll fly the unfriendly skies
US Air Force reveals B-21 Raider stealth bomber that'll fly the unfriendly skies'Digital bomber' will bring 'peace through deterrence' In Palmdale, California on Friday, Northrop Grumman...
Google Increases Android Security With Memory-Safe Programming Languages
Google Increases Android Security With Memory-Safe Programming LanguagesThe number of memory safety vulnerabilities in Android dropped from 223 in 2019 to 85 in 2022Leer másThe number...
Rackspace customers rage as email outage continues and migrations create migraines
Rackspace customers rage as email outage continues and migrations create migrainesHosting company has nothing to say on data loss, restore times, or root cause Rackspace has...
AWS launches new cybersecurity service Amazon Security Lake
AWS launches new cybersecurity service Amazon Security LakeAmazon Web Services (AWS) has launched a new cybersecurity service, Amazon Security Lake, which automatically centralizes security data from...
The Slow Shift Toward Passwordless Access
The Slow Shift Toward Passwordless Access A survey of 500 DevOps and security professionals suggested that shifting away from legacy authentication technologies to embrace passwordless approaches...
USENIX Security ’22 – Julia Słupska, Selina Cho, Marissa Begonia, Ruba Abu-Salma, Nayanatara Prakash, Mallika Balakrishnan “They Look At Vulnerability And Use That To Abuse You”
USENIX Security ’22 – Julia Słupska, Selina Cho, Marissa Begonia, Ruba Abu-Salma, Nayanatara Prakash, Mallika Balakrishnan “They Look At Vulnerability And Use That To Abuse You”Complete...
Schoolyard Bully Trojan Is After Facebook Users’ Accounts
Schoolyard Bully Trojan Is After Facebook Users’ AccountsA malware campaign designed for Android devices is aiming to steal Facebook accounts users and passwords and has already...
AWS’ Inspector offers vulnerability management for Lambda serverless functions
AWS' Inspector offers vulnerability management for Lambda serverless functionsAmazon Web Services has announced AWS Lambda serverless function support for its automated vulnerability management service, Amazon Inspector,...
Remuneration coming for TrustCor customers impacted by CA revocation
Remuneration coming for TrustCor customers impacted by CA revocationAlso, a Capone henchman lands behind bars, while nearly 9/10 DoD contract firms fail security standards In brief ...
Fortanix unveils AWS integration for centralized key management
Fortanix unveils AWS integration for centralized key managementCloud security vendor Fortanix has updated its Data Security Manager to incorporate support for AWS’ external encryption key store...
Google warns stolen Android keys used to sign info-stealing malware
Google warns stolen Android keys used to sign info-stealing malwareOEMs including Samsung, LG and Mediatek named and shamed Compromised Android platform certificate keys from device makers...
French Hospital Halts Operations After Cyber-Attack
French Hospital Halts Operations After Cyber-AttackAndré-Mignot hospital shuts down computer systemsLeer másAndré-Mignot hospital shuts down computer systems
8 things to consider amid cybersecurity vendor layoffs
8 things to consider amid cybersecurity vendor layoffs2022 has been a heavy year for layoffs in the technology sector. Whether due to budget restraints, mergers and...
Securing Application Identities in 2023
Securing Application Identities in 2023The rise and rise of non-human identities Webinar Just as Frank Sinatra sang in days gone by, 'love and marriage' goes together...
Software projects face supply chain security risk due to insecure artifact downloads via GitHub Actions
Software projects face supply chain security risk due to insecure artifact downloads via GitHub ActionsThe way build artifacts are stored by the GitHub Actions platform could...
Spanish Authorities Bust €12M Investment Scam Operation
Spanish Authorities Bust €12M Investment Scam OperationThe Spanish National Police dissolved a cybercrime ring that defrauded 300 people out of almost €12.3 million via phony investment...
Researchers found security pitfalls in IBM’s cloud infrastructure
Researchers found security pitfalls in IBM’s cloud infrastructureSecurity researchers recently probed IBM Cloud’s database-as-a-service infrastructure and found several security issues that granted them access to the...
When blaming the user for a security breach is unfair – or just wrong
When blaming the user for a security breach is unfair – or just wrongIn his career in IT security leadership, Aaron de Montmorency has seen a...