Apple finally adds encryption to iCloud backupsApple has rolled out a number of security features that will now offer end-to-end encryption to protect data, including backups,...
Month: December 2022
Cisco Warns of High-Severity Unpatched Flaw Affecting IP Phones Firmware
Cisco Warns of High-Severity Unpatched Flaw Affecting IP Phones FirmwareCisco has released a new security advisory warning of a high-severity flaw affecting IP Phone 7800 and...
Microsoft’s rough 2022 security year in review
Microsoft's rough 2022 security year in reviewWe soon close out the security year of 2022. Only time will tell what 2023 will bring, but for IT...
Researchers Detail New Attack Method to Bypass Popular Web Application Firewalls
Researchers Detail New Attack Method to Bypass Popular Web Application FirewallsA new attack method can be used to circumvent web application firewalls (WAFs) of various vendors...
Hack-for-Hire Group Targets Travel and Financial Entities with New Janicab Malware Variant
Hack-for-Hire Group Targets Travel and Financial Entities with New Janicab Malware VariantTravel agencies have emerged as the target of a hack-for-hire group dubbed Evilnum as part of a...
Royal Ransomware Threat Takes Aim at U.S. Healthcare System
Royal Ransomware Threat Takes Aim at U.S. Healthcare SystemThe U.S. Department of Health and Human Services (HHS) has cautioned of ongoing Royal ransomware attacks targeting healthcare...
FinTech & Banking: A Comprehensive Guide to Client Onboarding
FinTech & Banking: A Comprehensive Guide to Client OnboardingThe customer experience at the world’s biggest banks and fintech firms is undergoing a significant change. Because of...
JSON-based SQL injection attacks trigger need to update web application firewalls
JSON-based SQL injection attacks trigger need to update web application firewallsSecurity researchers have developed a generic technique for SQL injection that bypasses multiple web application firewalls...
Keep Your Grinch at Bay: Here’s How to Stay Safe Online this Holiday Season
Keep Your Grinch at Bay: Here's How to Stay Safe Online this Holiday SeasonAs the holiday season approaches, online shopping and gift-giving are at the top...
Complete guide to OT network segmentation
Complete guide to OT network segmentationAs industrial businesses connect their OT and IT networks, network segmentation is becoming an increasingly important approach. Using this method, it...
How the Middle East Transformation goals are affected by Cloud Computing
How the Middle East Transformation goals are affected by Cloud ComputingOver the past few years, cloud adoption has been increasing in the Middle East as more...
Android app signing keys leaked and used to sign malware
Android app signing keys leaked and used to sign malware One of the most important pillars of Android security is the cryptographic signature key used by...
Uptycs launches agentless cloud workload scanning
Uptycs launches agentless cloud workload scanningCNAPP (cloud native application protection platform) and XDR (extended detection and response ) provider Uptycs announced Friday that it has added...
Swarm Drones Have Flaws Nobody Is Talking About
Swarm Drones Have Flaws Nobody Is Talking AboutA million years ago (when I was at NASA working on security for people like physicists designing robots for...
The Whys and Hows of Cyber Risk Quantification
The Whys and Hows of Cyber Risk QuantificationArticles related to cyber risk quantification, cyber risk management, and cyber resilience. The post The Whys and Hows of...
14 lessons CISOs learned in 2022
14 lessons CISOs learned in 2022We're about to finish yet another erratic year, in which Elon Musk bought Twitter, Russia invaded Ukraine, and many workers returned...
MENA cybersecurity industry faces significant obstacles
MENA cybersecurity industry faces significant obstaclesAccording to projections, the size of the Middle East Cyber Security Market will increase from USD 20.3 billion in 2022 to...
The CISOs Guide to Storage & Backup Cyber Resiliency
The CISOs Guide to Storage & Backup Cyber ResiliencyCISOs rely on information from across the organization about security, particularly from the various IT departments. Unfortunately, the...
Code as Conduct: Compelled Web Speech Before US Supreme Court
Code as Conduct: Compelled Web Speech Before US Supreme Court On December 5, 2022, the United States Supreme Court once again jumped into the argument about...
3 Realities of Building a Security Awareness Training Program
3 Realities of Building a Security Awareness Training Program Security awareness training is a critical aspect of cybersecurity strategy because between 82% and 95% of security...
Credit card skimming – the long and winding road of supply chain failure
Credit card skimming – the long and winding road of supply chain failureDon't keep calling home to a JavaScript server that closed its doors eight years...
Cryptocurrency Mining Campaign Hits Linux Users with Go-based CHAOS Malware
Cryptocurrency Mining Campaign Hits Linux Users with Go-based CHAOS MalwareA cryptocurrency mining attack targeting the Linux operating system also involved the use of an open source...
S3 Ep112: Data breaches can haunt you more than once! [Audio + Text]
S3 Ep112: Data breaches can haunt you more than once! [Audio + Text]Breaches, exploits, busts, buffer overflows and bug hunting - entertaining and educational in equal...
Rackspace Admits Security Incident, Helps Customers Migrate to Microsoft 365 Accounts
Rackspace Admits Security Incident, Helps Customers Migrate to Microsoft 365 AccountsThe known impact was isolated to a portion of the firm's Hosted Exchange platformLeer másThe known...
Gen Z Internet Users “Normalize” Cybercrime – Report
Gen Z Internet Users "Normalize" Cybercrime - ReportEU-funded study finds concerning levels of risky behaviorLeer másEU-funded study finds concerning levels of risky behavior
Threat Actors Use Malicious File Systems to Scale Crypto-Mining Operations
Threat Actors Use Malicious File Systems to Scale Crypto-Mining OperationsThe hackers used PRoot to increase the scope of their operations to several Linux distributionsLeer másThe hackers...
Swiss Government Wants to Implement Mandatory Duty to Report Cyber-Attacks
Swiss Government Wants to Implement Mandatory Duty to Report Cyber-AttacksThe move would shed light on hackers and sound the alarm more widely on cyber-threats in the...
Christmas Warning: Threat Actors Impersonate your Favorite Brands to Attack, Finds CSC
Christmas Warning: Threat Actors Impersonate your Favorite Brands to Attack, Finds CSCMajority of third-party domain names impersonating the biggest global brands use domain privacy services, indicating...
China-Based Hackers Target Amnesty International Canada
China-Based Hackers Target Amnesty International CanadaResults suggest the attack was executed using tools and techniques associated with Chinese APTs.Leer másResults suggest the attack was executed using...
Supply Chain Web Skimming Attacks Hit Dozens of Sites
Supply Chain Web Skimming Attacks Hit Dozens of SitesMalicious e-commerce campaign ongoing since December 2021Leer másMalicious e-commerce campaign ongoing since December 2021