Android app signing keys leaked and used to sign malware One of the most important pillars of Android security is the cryptographic signature key used by...
Month: December 2022
Uptycs launches agentless cloud workload scanning
Uptycs launches agentless cloud workload scanningCNAPP (cloud native application protection platform) and XDR (extended detection and response ) provider Uptycs announced Friday that it has added...
Swarm Drones Have Flaws Nobody Is Talking About
Swarm Drones Have Flaws Nobody Is Talking AboutA million years ago (when I was at NASA working on security for people like physicists designing robots for...
MENA cybersecurity industry faces significant obstacles
MENA cybersecurity industry faces significant obstaclesAccording to projections, the size of the Middle East Cyber Security Market will increase from USD 20.3 billion in 2022 to...
14 lessons CISOs learned in 2022
14 lessons CISOs learned in 2022We're about to finish yet another erratic year, in which Elon Musk bought Twitter, Russia invaded Ukraine, and many workers returned...
The Whys and Hows of Cyber Risk Quantification
The Whys and Hows of Cyber Risk QuantificationArticles related to cyber risk quantification, cyber risk management, and cyber resilience. The post The Whys and Hows of...
The CISOs Guide to Storage & Backup Cyber Resiliency
The CISOs Guide to Storage & Backup Cyber ResiliencyCISOs rely on information from across the organization about security, particularly from the various IT departments. Unfortunately, the...
Code as Conduct: Compelled Web Speech Before US Supreme Court
Code as Conduct: Compelled Web Speech Before US Supreme Court On December 5, 2022, the United States Supreme Court once again jumped into the argument about...
3 Realities of Building a Security Awareness Training Program
3 Realities of Building a Security Awareness Training Program Security awareness training is a critical aspect of cybersecurity strategy because between 82% and 95% of security...
Credit card skimming – the long and winding road of supply chain failure
Credit card skimming – the long and winding road of supply chain failureDon't keep calling home to a JavaScript server that closed its doors eight years...
Cryptocurrency Mining Campaign Hits Linux Users with Go-based CHAOS Malware
Cryptocurrency Mining Campaign Hits Linux Users with Go-based CHAOS MalwareA cryptocurrency mining attack targeting the Linux operating system also involved the use of an open source...
S3 Ep112: Data breaches can haunt you more than once! [Audio + Text]
S3 Ep112: Data breaches can haunt you more than once! [Audio + Text]Breaches, exploits, busts, buffer overflows and bug hunting - entertaining and educational in equal...
Rackspace Admits Security Incident, Helps Customers Migrate to Microsoft 365 Accounts
Rackspace Admits Security Incident, Helps Customers Migrate to Microsoft 365 AccountsThe known impact was isolated to a portion of the firm's Hosted Exchange platformLeer másThe known...
Gen Z Internet Users “Normalize” Cybercrime – Report
Gen Z Internet Users "Normalize" Cybercrime - ReportEU-funded study finds concerning levels of risky behaviorLeer másEU-funded study finds concerning levels of risky behavior
Threat Actors Use Malicious File Systems to Scale Crypto-Mining Operations
Threat Actors Use Malicious File Systems to Scale Crypto-Mining OperationsThe hackers used PRoot to increase the scope of their operations to several Linux distributionsLeer másThe hackers...
Swiss Government Wants to Implement Mandatory Duty to Report Cyber-Attacks
Swiss Government Wants to Implement Mandatory Duty to Report Cyber-AttacksThe move would shed light on hackers and sound the alarm more widely on cyber-threats in the...
Christmas Warning: Threat Actors Impersonate your Favorite Brands to Attack, Finds CSC
Christmas Warning: Threat Actors Impersonate your Favorite Brands to Attack, Finds CSCMajority of third-party domain names impersonating the biggest global brands use domain privacy services, indicating...
China-Based Hackers Target Amnesty International Canada
China-Based Hackers Target Amnesty International CanadaResults suggest the attack was executed using tools and techniques associated with Chinese APTs.Leer másResults suggest the attack was executed using...
Supply Chain Web Skimming Attacks Hit Dozens of Sites
Supply Chain Web Skimming Attacks Hit Dozens of SitesMalicious e-commerce campaign ongoing since December 2021Leer másMalicious e-commerce campaign ongoing since December 2021
ICO Fines Rogue Nuisance Callers £500,000
ICO Fines Rogue Nuisance Callers £500,000Some companies forced victims to share card detailsLeer másSome companies forced victims to share card details
Russia’s VTB Bank Suffers its Biggest Ever DDoS
Russia's VTB Bank Suffers its Biggest Ever DDoSUkraine suspected of attack on state-owned lenderLeer másUkraine suspected of attack on state-owned lender
UK Government Department Using Unsupported Applications, Reveals Watchdog
UK Government Department Using Unsupported Applications, Reveals WatchdogAlmost a third (30%) of applications used by Defra are unsupported, a report from the National Audit Office has...
USENIX Security ’22 – Octavian Suciu, Connor Nelson, Zhuoer Lyu, Tiffany Bao, Tudor Dumitraș’ Expected Exploitability: Predicting the Development of Functional Vulnerability Exploits’
USENIX Security ’22 – Octavian Suciu, Connor Nelson, Zhuoer Lyu, Tiffany Bao, Tudor Dumitraș’ Expected Exploitability: Predicting the Development of Functional Vulnerability Exploits’Our thanks to USENIX...
What you should know when considering cyber insurance in 2023
What you should know when considering cyber insurance in 2023As the frequency and severity of ransomware, phishing, and denial of service attacks has increased, so has...
GUEST ESSAY: ‘Continuous authentication’ is driving passwordless sessions into the mainstream
GUEST ESSAY: ‘Continuous authentication’ is driving passwordless sessions into the mainstreamMuch more effective authentication is needed to help protect our digital environment – and make user...
What Is Domain Spoofing and How to Stop It
What Is Domain Spoofing and How to Stop ItDomain spoofing tricks users into visiting a malicious site. Learn about domain spoofing and how to stop them....
The changing role of the MITRE ATT@CK framework
The changing role of the MITRE ATT@CK frameworkSince its creation in 2013, the MITRE ATT&CK framework has been of interest to security operations professionals. In the...
Lightspin announces full coverage for AWS Vortex, AWS Time Machine and 3 others services following AWS Re:Invent
Lightspin announces full coverage for AWS Vortex, AWS Time Machine and 3 others services following AWS Re:Invent Today, Lightspin is thrilled to announce that our cloud...
The cybersecurity challenges and opportunities of digital twins
The cybersecurity challenges and opportunities of digital twinsDigital twins are a digital representation of objects, structures or systems that give organizations greater insight into the life...
Themes from Bosch Connected World 2022: The Role of Cybersecurity in the Future of Digital
Themes from Bosch Connected World 2022: The Role of Cybersecurity in the Future of DigitalRead on for part two of my recap of Bosch Connected World,...









