Cisco Firepower Threat Defense Software Privilege Escalation VulnerabilityA vulnerability in the management web server of Cisco Firepower Threat Defense (FTD) Software could allow an authenticated, remote...
Month: December 2022
Why Healthcare Needs to Beef Up Incident Response Plans
Why Healthcare Needs to Beef Up Incident Response PlansEffective testing of incident response plans continues to be a major weakness for many healthcare sector entities, especially...
Cisco Firepower Threat Defense Software Generic Routing Encapsulation Denial of Service Vulnerability
Cisco Firepower Threat Defense Software Generic Routing Encapsulation Denial of Service VulnerabilityA vulnerability in the generic routing encapsulation (GRE) tunnel decapsulation feature of Cisco Firepower Threat...
Can I tell you a secret? Episode two: the widening circle
Can I tell you a secret? Episode two: the widening circleRevisited: As the cyberstalker spreads his net wider, anyone could be a target. The fast-changing world...
Can I tell you a secret? Episode three: the man upstairs – podcast
Can I tell you a secret? Episode three: the man upstairs – podcastRevisited: who is Matthew Hardy? Journalist Sirin Kale looks for clues about what motivates...
How to Reduce Clinician Friction in a Zero Trust Approach
How to Reduce Clinician Friction in a Zero Trust ApproachA carefully honed zero trust approach can allow healthcare entities to reduce pushback from clinicians while still...
Cybersecurity firm links Piers Morgan Twitter hack to leak of 400m records
Cybersecurity firm links Piers Morgan Twitter hack to leak of 400m recordsFormer Australian prime minister Scott Morrison among politicians and celebrities whose details were in sample...
Panel Discussion | The Risky Business of UnInspected Encrypted Traffic, User Privacy, and Compliance
Panel Discussion | The Risky Business of UnInspected Encrypted Traffic, User Privacy, and ComplianceContenido de la entradaLeer másDataBreachToday.com RSS Syndication
Linux Critical Kernel-Level Bug Affects SMB Servers
Linux Critical Kernel-Level Bug Affects SMB ServersVulnerability With CVSS Score of 10 Affects KSMBD-Enabled ServersA critical Linux kernel vulnerability exposed the server message block protocol to...
Hackers Steal Power Utility Customer Data
Hackers Steal Power Utility Customer DataSargent & Lundy Informs Over 6,900 That Hackers Stole Their Social Security NumbersConstruction and engineering firm Sargent & Lundy is informing...
Ohio Supreme Court Says Ransomware Is Not Physical Damage
Ohio Supreme Court Says Ransomware Is Not Physical DamageJustices Rule Against Software Developer in Bid to Use Insurance to Cover AttackAn Ohio software developer that attempted...
US Department of Justice Reportedly Investigates FTX Hack
US Department of Justice Reportedly Investigates FTX HackUnknown Actors Stole $372M From FTX Hours After It Filed For Bankruptcy in NovemberThe theft of nearly $400 million...
Cybercrime (and Security) Predictions for 2023
Cybercrime (and Security) Predictions for 2023Threat actors continue to adapt to the latest technologies, practices, and even data privacy laws—and it's up to organizations to stay...
Glupteba Botnet Continues to Thrive Despite Google’s Attempts to Disrupt It
Glupteba Botnet Continues to Thrive Despite Google's Attempts to Disrupt ItThe operators of the Glupteba botnet resurfaced in June 2022 as part of a renewed and...
Researchers Discover Malicious PyPI Package Posing as SentinelOne SDK to Steal Data
Researchers Discover Malicious PyPI Package Posing as SentinelOne SDK to Steal DataCybersecurity researchers have discovered a new malicious package on the Python Package Index (PyPI) repository...
Microsoft Details Gatekeeper Bypass Vulnerability in Apple macOS Systems
Microsoft Details Gatekeeper Bypass Vulnerability in Apple macOS SystemsMicrosoft has disclosed details of a now-patched security flaw in Apple macOS that could be exploited by an...
W4SP Stealer Discovered in Multiple PyPI Packages Under Various Names
W4SP Stealer Discovered in Multiple PyPI Packages Under Various NamesThreat actors have published yet another round of malicious packages to Python Package Index (PyPI) with the...
German EV Sales Dominated by DS, MG and Audi
German EV Sales Dominated by DS, MG and AudiSince I wrote a post a few weeks back — looking at huge Fiat EV sales in Germany...
Happy Hanukkah!
Happy Hanukkah!Originally Published in December 2019: United State's NASA Astronaut Jessica Meir's Hanukkah Wishes from the International Space Station: Happy Hanukkah to all those who celebrate...
Joyeux Noël et Bonne Année
Joyeux Noël et Bonne AnnéeThe post Joyeux Noël et Bonne Année appeared first on Security Boulevard. Leer másSecurity BoulevardThe post Joyeux Noël et Bonne Année appeared...
A Merry Little Christmas And A Happy New Year
A Merry Little Christmas And A Happy New YearThe post A Merry Little Christmas And A Happy New Year appeared first on Security Boulevard. Leer másSecurity...
How Compliance Automation Can Turn Your Risk Register into a Valuable Business Tool
How Compliance Automation Can Turn Your Risk Register into a Valuable Business ToolLearn how compliance automation can help you turn your risk register into a valuable...
“Free Speed Extremist” Tesla CEO Demands All Brakes Removed
“Free Speed Extremist” Tesla CEO Demands All Brakes RemovedThe Twitter CEO has a speed problem. He repeatedly crashes things that other people made, pleads for public...
Nepal’s Maoist Guerrilla War Leader Appointed Prime Minister
Nepal’s Maoist Guerrilla War Leader Appointed Prime MinisterOn a sunny and clear cold day in December 1990 (as I’ve mentioned before), I stood on a narrow...
Is your cloud ready for CCPA?
Is your cloud ready for CCPA?New Year’s resolutions aren’t the only thing you should be preparing for this time of year. January 1st, 2023, CCPA will...
Historian Points Out Putin Parroting Propaganda of Goebbels
Historian Points Out Putin Parroting Propaganda of GoebbelsStephen Norris, Russian history professor at Miami University, offers this comparison: One of the more worrisome trends in Putin...
The Year in Review and 2023 Predictions
The Year in Review and 2023 PredictionsIn our last episode of the year, we discuss the year that was 2022. What did we get right? What...
TikTok parent company ByteDance revealed the use of TikTok data to track journalists
TikTok parent company ByteDance revealed the use of TikTok data to track journalistsByteDance admitted that its employees accessed TikTok data to track journalists to identify the...
Raspberry Robin malware used in attacks against Telecom and Governments
Raspberry Robin malware used in attacks against Telecom and GovernmentsThe Raspberry Robin worm attacks aimed at telecommunications and government office systems across Latin America, Australia, and Europe. Researchers...
Expert found Backdoor credentials in ZyXEL LTE3301 M209
Expert found Backdoor credentials in ZyXEL LTE3301 M209The cybersecurity researcher RE-Solver discovered Backdoor credentials in ZyXEL LTE3301-M209 LTE indoor routers. Security researcher ReSolver announced the discovery...