Can I tell you a secret? Episode one: the beginningGuardian journalist Sirin Kale takes us to a small town in the north of England to uncover...
Year: 2022
Can I tell you a secret? Episode four: a reckoning
Can I tell you a secret? Episode four: a reckoningMatthew’s victims come face to face with him as an attempt is made to stop his torment...
K28942395: OpenSSH vulnerability CVE-2018-15473
K28942395: OpenSSH vulnerability CVE-2018-15473OpenSSH vulnerability CVE-2018-15473 Security Advisory Security Advisory Description OpenSSH through 7.7 is prone to a user enumeration vulnerability due to not delaying bailout...
Can I tell you a secret? Episode three: the man upstairs
Can I tell you a secret? Episode three: the man upstairsWho is Matthew? Journalist Sirin Kale looks for clues about who this cyberstalker really is and...
Can I tell you a secret? Episode five: a mother’s love – podcast
Can I tell you a secret? Episode five: a mother’s love – podcastJournalist Sirin Kale meets Matthew’s mother to uncover more about his past, and find...
Can I tell you a secret? Episode six: the winding clock
Can I tell you a secret? Episode six: the winding clockAs the years tick by, journalist Sirin Kale speaks to victims and those who know Matthew...
Optus cyber-attack could involve customers dating back to 2017
Optus cyber-attack could involve customers dating back to 2017CEO says company has not yet confirmed how many people were affected by hack, but 9.8 million was...
Optus cyber-attack could involve customers dating back to 2017
Optus cyber-attack could involve customers dating back to 2017CEO says company has not yet confirmed how many people were affected by hack, but 9.8 million was...
Optus cyber-attack: how do you know if your identity has been stolen and what will happen to your data?
Optus cyber-attack: how do you know if your identity has been stolen and what will happen to your data?After a massive data breach potentially exposed the...
Optus Falls Victim to Security Breach
Optus Falls Victim to Security BreachAustralian mobile operator Optus is investigating a security breach after they spotted “unauthorized access” to former and current customers’ personal data....
8 mistakes CIOs make and how to avoid them
8 mistakes CIOs make and how to avoid themFrom driving transformative change, to sharing insights into the political nature of the role, IT leaders and advisors...
Standards: The CPSO’s Best Friend
Standards: The CPSO’s Best FriendWorkshop Shines Light on Role of Standards in Cybersecurity for IoT What do Chief Product Security Officers (CPSOs) want to make their...
Morgan Stanley Sanctioned for Exposing Information of 15 Million Customers
Morgan Stanley Sanctioned for Exposing Information of 15 Million CustomersOn Tuesday, September 20, 2022, The Securities and Exchange Commission (SEC) revealed that Morgan Stanley financial services...
Telepathic Declassification
Telepathic DeclassificationFormer President Trump recently suggested that the sitting President simply needs to “think” something is declassified in order to declassify it. Is there a cascade...
Multi-Million Dollar Global Credit Card Scam Exposed
Multi-Million Dollar Global Credit Card Scam ExposedA massive global multi-million dollar scam, operating since 2019, has been uncovered. The number of victims is in the range...
Active Directory Attack Scenarios: The Path from Printer to Domain Admin
Active Directory Attack Scenarios: The Path from Printer to Domain AdminThe post Active Directory Attack Scenarios: The Path from Printer to Domain Admin appeared first on...
How Russians Are Reacting to Putin’s Conscription Gamble
How Russians Are Reacting to Putin’s Conscription GambleReal-time data from Russian social media platforms and related illicit communities is vital to understanding the domestic public response...
WEBINAR: Bundling Up: The Importance of Layering Offensive Security Solutions
WEBINAR: Bundling Up: The Importance of Layering Offensive Security SolutionsThe post WEBINAR: Bundling Up: The Importance of Layering Offensive Security Solutions appeared first on Digital Defense....
Mobile Ransomware: The Next Step for Cybercriminals
Mobile Ransomware: The Next Step for Cybercriminals Targeting smartphones started to be increasingly appealing to cybercriminals as these devices become more and more important in users’...
Seven-Year Mobile Surveillance Campaign Targets Uyghurs
Seven-Year Mobile Surveillance Campaign Targets UyghursScarlet Mimic group uses over 20 Android malware variantsLeer másScarlet Mimic group uses over 20 Android malware variants
Australian Telecoms company Optus discloses security breach
Australian Telecoms company Optus discloses security breachAustralian telecoms company Optus disclosed a data breach, threat actors gained access to former and current customers. Optus, one of...
AttachMe: a critical flaw affects Oracle Cloud Infrastructure (OCI)
AttachMe: a critical flaw affects Oracle Cloud Infrastructure (OCI)A critical vulnerability in Oracle Cloud Infrastructure (OCI) could be exploited to access the virtual disks of other...
Details of Over 300,000 Russian Reservists Leaked, Anonymous Claims
Details of Over 300,000 Russian Reservists Leaked, Anonymous ClaimsThe group claims the individuals are likely to be mobilized by the Russian government to fight in UkraineLeer...
Surge in Magento 2 template attacks exploiting the CVE-2022-24086 flaw
Surge in Magento 2 template attacks exploiting the CVE-2022-24086 flawSansec researchers warn of a surge in hacking attempts targeting a critical Magento 2 vulnerability tracked as...
5 ways to grow the cybersecurity workforce
5 ways to grow the cybersecurity workforceThe demand for cybersecurity professionals has surged over the past decade. According to (ISC)2’s 2020 Cybersecurity Workforce Study, while the...
CISA adds Zoho ManageEngine flaw to its Known Exploited Vulnerabilities Catalog
CISA adds Zoho ManageEngine flaw to its Known Exploited Vulnerabilities CatalogCISA added a security flaw in Zoho ManageEngine, tracked as CVE-2022-35405, to its Known Exploited Vulnerabilities Catalog. The...
Daniel Stori’s ‘The Ketchup Gun’
Daniel Stori’s ‘The Ketchup Gun’ via Daniel Stori, crafting comics at turnoff.us! Permalink The post Daniel Stori’s ‘The Ketchup Gun’ appeared first on Security Boulevard. Leer...
Cyber Mercenary Group Void Balaur Continues Hack-For-Hire Campaigns
Cyber Mercenary Group Void Balaur Continues Hack-For-Hire CampaignsVoid Balaur campaigns in 2022 targeted various industries across the US, Russia and UkraineLeer másVoid Balaur campaigns in 2022...
Anonymous claims to have hacked the website of the Russian Ministry of Defense
Anonymous claims to have hacked the website of the Russian Ministry of DefenseThe popular collective Anonymous claims to have hacked the website of the Russian Ministry...
Best 10 SIEM Tools to Fuel Up Your Threat-Hunting Grind
Best 10 SIEM Tools to Fuel Up Your Threat-Hunting GrindThreat-hunting has proven to be the most efficient, field-proven countermeasure against cyber threats. Action items based on...
























