The Role of Endpoint Security and Management In Threat DetectionBy Ashley Leonard, CEO & Founder, Syxsense According to a recent Verizon DBIR, 70% of security breaches...
Day: December 5, 2022
Is AI At the Edge Right for Your Business And Three Tips To Consider
Is AI At the Edge Right for Your Business And Three Tips To ConsiderBy Camille Morhardt, Dir Security Initiatives & Rita Wouhaybi, Senior Principal AI Engineer,...
Is Your Passwordless Solution Really Passwordless?
Is Your Passwordless Solution Really Passwordless?By Tim Callan, Chief Compliance Officer, Sectigo The term “passwordless” is a trendy marketing buzzword with no shortage […] The post...
Minimizing the Military Attack Surface with Peer-to-Peer Communications and Zero Trust
Minimizing the Military Attack Surface with Peer-to-Peer Communications and Zero TrustBy Adam Fish, CEO, Ditto Perhaps there’s no scenario where cybersecurity is more critical than on...
Penetration Scanning Must Be Key Part of The Modern Business Arsenal
Penetration Scanning Must Be Key Part of The Modern Business ArsenalBy Patti Key, Chief Revenue Officer (CRO), TPx Security remains among companies’ top challenges, permeating nearly...
CVE-2022-41974, CVE-2022-41973, CVE-2022-3328 Exploit Detection: Three Linux Vulnerabilities Chained to Gain Full Root Privileges
CVE-2022-41974, CVE-2022-41973, CVE-2022-3328 Exploit Detection: Three Linux Vulnerabilities Chained to Gain Full Root Privileges Security experts from Qualys’ Threat Research Unit warn of a novel vulnerability ...
Whoops! Researchers accidentally crash botnet used to launch DDoS and cryptomining campaigns
Whoops! Researchers accidentally crash botnet used to launch DDoS and cryptomining campaignsResearchers investigating a newly-discovered botnet have admitted that they "accidentally" broke Read more in my...
LastPass Security Breach
LastPass Security BreachThe company was hacked, and customer information accessed. No passwords were compromised. Leer másSchneier on SecurityThe company was hacked, and customer information accessed. No...
ConnectWise Quietly Patches Flaw That Helps Phishers
ConnectWise Quietly Patches Flaw That Helps PhishersConnectWise, which offers a self-hosted, remote desktop software application that is widely used by Managed Service Providers (MSPs), is warning...
Existential Risk and the Fermi Paradox
Existential Risk and the Fermi ParadoxWe know that complexity is the worst enemy of security, because it makes attack easier and defense harder. This becomes catastrophic...
CAPTCHA
CAPTCHAThis is an actual CAPTCHA I was shown when trying to log into PayPal. As an actual human and not a bot, I had no idea...
Friday Squid Blogging: Legend of the Indiana Oil-Pit Squid
Friday Squid Blogging: Legend of the Indiana Oil-Pit SquidAt a GMC plant. As usual, you can also use this squid post to talk about the security...
Judge Orders U.S. Lawyer in Russian Botnet Case to Pay Google
Judge Orders U.S. Lawyer in Russian Botnet Case to Pay GoogleIn December 2021, Google filed a civil lawsuit against two Russian men thought to be responsible...
Enhanced Protection – The strongest level of Safe Browsing protection Google Chrome has to offer
Enhanced Protection - The strongest level of Safe Browsing protection Google Chrome has to offerPosted by Benjamin Ackerman (Chrome Security and Jonathan Li (Safe Browsing) As...
Memory Safe Languages in Android 13
Memory Safe Languages in Android 13Posted by Jeffrey Vander Stoep For more than a decade, memory safety vulnerabilities have consistently represented more than 65% of vulnerabilities...
Google Chrome emergency update fixes 9th zero-day of the year
Google Chrome emergency update fixes 9th zero-day of the yearGoogle has released Chrome 108.0.5359.94/.95 for Windows, Mac, and Linux users to address a single high-severity security...
The Week in Ransomware – December 2nd 2022 – Disrupting Health Care
The Week in Ransomware - December 2nd 2022 - Disrupting Health CareThis week's big news was the Colombia health system being severely disrupted by a ransomware...
Industry 4.0: CNC Machine Security Risks Part 2
Industry 4.0: CNC Machine Security Risks Part 2This three-part blog series explores the risks associated with CNC machinesLeer másTrend Micro Research, News, PerspectivesThis three-part blog series...
Hackers use new, fake crypto app to breach networks, steal cryptocurrency
Hackers use new, fake crypto app to breach networks, steal cryptocurrencyThe North Korean 'Lazarus' hacking group is linked to a new attack spreading fake cryptocurrency apps...
SIM swapper gets 18-months for involvement in $22 million crypto heist
SIM swapper gets 18-months for involvement in $22 million crypto heistFlorida man Nicholas Truglia was sentenced to 18 months in prison on Thursday for his involvement...
Open source software host Fosshost shutting down as CEO unreachable
Open source software host Fosshost shutting down as CEO unreachableOpen source software hosting provider Fosshost will no longer be providing services as it reaches end of...
Android malware apps with 2 million installs spotted on Google Play
Android malware apps with 2 million installs spotted on Google PlayA new set of Android malware, phishing, and adware apps have infiltrated the Google Play store, tricking...
OpenAI’s new ChatGPT bot: 10 coolest things you can do with it
OpenAI's new ChatGPT bot: 10 coolest things you can do with itFrom precisely spotting security vulnerabilities in your code, to writing an entire block of functional code on...
Hackers hijack Linux devices using PRoot isolated filesystems
Hackers hijack Linux devices using PRoot isolated filesystemsHackers are abusing the open-source Linux PRoot utility in BYOF (Bring Your Own Filesystem) attacks to provide a consistent...
Severe AMI MegaRAC flaws impact servers from AMD, ARM, HPE, Dell, others
Severe AMI MegaRAC flaws impact servers from AMD, ARM, HPE, Dell, othersThree vulnerabilities in the American Megatrends MegaRAC Baseboard Management Controller (BMC) software impact server equipment...
Sneaky hackers reverse defense mitigations when detected
Sneaky hackers reverse defense mitigations when detectedA financially motivated threat actor is hacking telecommunication service providers and business process outsourcing firms, actively reversing defensive mitigations applied...
Ransomware attack forces French hospital to transfer patients
Ransomware attack forces French hospital to transfer patientsThe André-Mignot teaching hospital in the suburbs of Paris had to shut down its phone and computer systems because of...
CISA orders agencies to patch exploited Google Chrome bug by Dec 26th
CISA orders agencies to patch exploited Google Chrome bug by Dec 26thThe Cybersecurity and Infrastructure Security Agency (CISA) has added one more security vulnerability to its list of...
As a technology leader, Celebrate National Computer Security Day!
As a technology leader, Celebrate National Computer Security Day!EXECUTIVE SUMMARY: As a technology leader, you know that cyber security is a rapidly-evolving area and that there...
How to reduce industrial cyber attacks during cloud transformation
How to reduce industrial cyber attacks during cloud transformationContributed by April Miller, Senior Writer for Rehack.com. Cloud transformation is a critical step for businesses undertaking Industry...