5 top qualities you need to become a next-gen CISORansomware and data breaches pose a massive risk to organizations, resulting in loss of customer trust and...
Day: December 5, 2022
Judge Orders U.S. Lawyer in Russian Botnet Case to Pay Google
Judge Orders U.S. Lawyer in Russian Botnet Case to Pay GoogleIn December 2021, Google filed a civil lawsuit against two Russian men thought to be responsible...
‘Black Proxies’ Enable Threat Actors to Conduct Malicious Activity
'Black Proxies' Enable Threat Actors to Conduct Malicious ActivityFirst used as botnets, their lucrative nature turned them into independent criminal enterprisesLeer másFirst used as botnets, their...
Ping of death! FreeBSD fixes crashtastic bug in network tool
Ping of death! FreeBSD fixes crashtastic bug in network toolIt's a venerable program, and this version had a venerable bug in it.Leer másNaked SecurityIt's a venerable...
Google Increases Android Security With Memory-Safe Programming Languages
Google Increases Android Security With Memory-Safe Programming LanguagesThe number of memory safety vulnerabilities in Android dropped from 223 in 2019 to 85 in 2022Leer másThe number...
AWS launches new cybersecurity service Amazon Security Lake
AWS launches new cybersecurity service Amazon Security LakeAmazon Web Services (AWS) has launched a new cybersecurity service, Amazon Security Lake, which automatically centralizes security data from...
The Slow Shift Toward Passwordless Access
The Slow Shift Toward Passwordless Access A survey of 500 DevOps and security professionals suggested that shifting away from legacy authentication technologies to embrace passwordless approaches...
Schoolyard Bully Trojan Is After Facebook Users’ Accounts
Schoolyard Bully Trojan Is After Facebook Users’ AccountsA malware campaign designed for Android devices is aiming to steal Facebook accounts users and passwords and has already...
USENIX Security ’22 – Julia Słupska, Selina Cho, Marissa Begonia, Ruba Abu-Salma, Nayanatara Prakash, Mallika Balakrishnan “They Look At Vulnerability And Use That To Abuse You”
USENIX Security ’22 – Julia Słupska, Selina Cho, Marissa Begonia, Ruba Abu-Salma, Nayanatara Prakash, Mallika Balakrishnan “They Look At Vulnerability And Use That To Abuse You”Complete...
Fortanix unveils AWS integration for centralized key management
Fortanix unveils AWS integration for centralized key managementCloud security vendor Fortanix has updated its Data Security Manager to incorporate support for AWS’ external encryption key store...
AWS’ Inspector offers vulnerability management for Lambda serverless functions
AWS' Inspector offers vulnerability management for Lambda serverless functionsAmazon Web Services has announced AWS Lambda serverless function support for its automated vulnerability management service, Amazon Inspector,...
8 things to consider amid cybersecurity vendor layoffs
8 things to consider amid cybersecurity vendor layoffs2022 has been a heavy year for layoffs in the technology sector. Whether due to budget restraints, mergers and...
French Hospital Halts Operations After Cyber-Attack
French Hospital Halts Operations After Cyber-AttackAndré-Mignot hospital shuts down computer systemsLeer másAndré-Mignot hospital shuts down computer systems
Software projects face supply chain security risk due to insecure artifact downloads via GitHub Actions
Software projects face supply chain security risk due to insecure artifact downloads via GitHub ActionsThe way build artifacts are stored by the GitHub Actions platform could...
Spanish Authorities Bust €12M Investment Scam Operation
Spanish Authorities Bust €12M Investment Scam OperationThe Spanish National Police dissolved a cybercrime ring that defrauded 300 people out of almost €12.3 million via phony investment...
When blaming the user for a security breach is unfair – or just wrong
When blaming the user for a security breach is unfair – or just wrongIn his career in IT security leadership, Aaron de Montmorency has seen a...
Microsoft: Beware Russian Winter Cyber-Offensive
Microsoft: Beware Russian Winter Cyber-OffensiveUkraine's allies may be in the firing line for destructive attacksLeer másUkraine's allies may be in the firing line for destructive attacks
Researchers found security pitfalls in IBM’s cloud infrastructure
Researchers found security pitfalls in IBM’s cloud infrastructureSecurity researchers recently probed IBM Cloud’s database-as-a-service infrastructure and found several security issues that granted them access to the...
Digital Giant ABB to Pay $315m in Bribery Case
Digital Giant ABB to Pay $315m in Bribery CaseFirm pleads guilty in major South Africa conspiracyLeer másFirm pleads guilty in major South Africa conspiracy
API Vulnerabilities: What Are These and How to Protect your Business Against Them
API Vulnerabilities: What Are These and How to Protect your Business Against ThemApplication programming interfaces (APIs)Â are software intermediaries that allow different programs to communicate efficiently with...
Manufacturers Struggle to Manage Cyber-Threats from New Tech Deployments
Manufacturers Struggle to Manage Cyber-Threats from New Tech Deployments42% of UK manufacturers have been a victim of cybercrime in the past 12 months, according to new...
Google Releases Chrome Emergency Fix For Ninth Zero-Day This Year
Google Releases Chrome Emergency Fix For Ninth Zero-Day This YearThe flaw relates to a type confusion bug in the V8 JavaScript engineLeer másThe flaw relates to...
Cyber Extortion Growing Exponentially in Africa, Middle East and China, Finds Orange
Cyber Extortion Growing Exponentially in Africa, Middle East and China, Finds OrangeBusinesses are getting better at preventing cyber incidents, Orange Cybedefense’s head of Security Research Center...
What Is Digital Forensics and Incident Response (DFIR)?
What Is Digital Forensics and Incident Response (DFIR)?Digital Forensics and Incident Response (DFIR) is an aspect of cybersecurity focused on identifying, investigating, and fixing cyberattacks. Digital forensics...
‘Team Mysterious Bangladesh’ Hackers Target Indian Education Entity
'Team Mysterious Bangladesh' Hackers Target Indian Education EntityThe hackers allegedly stole PII, including names, Aadhar numbers and IFSC codesLeer másThe hackers allegedly stole PII, including names,...
Rackspace Restores Systems After Security Incident
Rackspace Restores Systems After Security IncidentThe known impact was isolated to a portion of the firm's Hosted Exchange platformLeer másThe known impact was isolated to a...
Data Breaches in Australia Will Now Result in Fines of Up to AU$50 Million
Data Breaches in Australia Will Now Result in Fines of Up to AU$50 MillionThe Australian Parliament approved Government’s privacy penalty bill: the maximum fine for companies...
A new Linux flaw can be chained with other two bugs to gain full root privileges
A new Linux flaw can be chained with other two bugs to gain full root privilegesQualys researchers demonstrated how to chain a new Linux flaw with...
Malicious Apps with Over 2 Million Installs Found on Google Play
Malicious Apps with Over 2 Million Installs Found on Google PlayMultiple apps pretending to be useful utilities and system optimizers, but hiding malware have been identified...
Google fixed the ninth actively exploited Chrome zeroday this year
Google fixed the ninth actively exploited Chrome zeroday this yearGoogle released security updates to address a new Chrome zero-day flaw, tracked as CVE-2022-4262, actively exploited in...