Darktrace's Share Value Plummets as Thoma Bravo Buyout Falls ThroughThe buyout fell through hours before the UK company said that millions of pounds in revenue had...
Year: 2022
LogonBox SSPR 2.3.17
LogonBox SSPR 2.3.17Introduction LogonBox is pleased to announce the immediate availability of LogonBox SSPR 2.3.17.This release includes performance improvements for profile checking and Secure Nodes, as...
LognBox VPN 2.3.17
LognBox VPN 2.3.17IntroductionLogonBox is pleased to announce the immediate availability of LogonBox SSPR 2.3.17.This release includes connectivity improvements for currently connected clients as well as added...
Ransomware Campaigns Linked to Iranian Govt’s DEV-0270 Hackers
Ransomware Campaigns Linked to Iranian Govt's DEV-0270 HackersDEV-0270 leverages exploits for newly disclosed vulnerabilities to gain access to devicesLeer másDEV-0270 leverages exploits for newly disclosed vulnerabilities...
Intro to crypto wallet authentication
Intro to crypto wallet authenticationModern application development has wrestled with numerous shortcomings in the security paradigm. Blockchain can mitigate several of those shortcomings, but it requires...
S3 Ep99: TikTok “attack” – was there a data breach, or not? [Audio + Text]
S3 Ep99: TikTok “attack” – was there a data breach, or not? [Audio + Text]Latest episode - listen now! (Or read if you prefer - full...
FBI Warning on Credential Stuffing & Residential Proxies is Good News – Bad News
FBI Warning on Credential Stuffing & Residential Proxies is Good News – Bad NewsThe FBI is warning security professionals to be on the lookout for increased...
How posting personal and business photos can be a security risk
How posting personal and business photos can be a security riskMarketers in every industry enjoy evidencing their reach to their superiors and providing tangible examples of...
Over 10% of Enterprise IT Assets Found Missing Endpoint Protection
Over 10% of Enterprise IT Assets Found Missing Endpoint ProtectionThe document analyzes data aggregated from visibility into more than 500,000 IT assetsLeer másThe document analyzes data...
RDP on the radar: An up‑close view of evolving remote access threats
RDP on the radar: An up‑close view of evolving remote access threatsMisconfigured remote access services continue to give bad actors an easy access path to company networks...
Ex-members of the Conti ransomware gang target Ukraine
Ex-members of the Conti ransomware gang target UkraineSome members of the Conti ransomware gang were involved in financially motivated attacks targeting Ukraine from April to August...
Albania interrupted diplomatic ties with Iran over the mid-July attack
Albania interrupted diplomatic ties with Iran over the mid-July attackAlbania interrupted diplomatic ties with Iran and expelled the country’s embassy staff over the mid-July attack. Albanian...
Rapid7 Discusses SIGMA Spectrum Infusion Pump and WiFi Battery Vulnerabilities
Rapid7 Discusses SIGMA Spectrum Infusion Pump and WiFi Battery VulnerabilitiesThe vulnerabilities, now fixed, allowed for a potential man in the middle attackLeer másThe vulnerabilities, now fixed,...
Cisco will not fix the authentication bypass flaw in EoL routers
Cisco will not fix the authentication bypass flaw in EoL routersCisco fixed new security flaws affecting its products, including a recently disclosed high-severity issue in NVIDIA Data Plane...
North Korea-linked Lazarus APT targets energy providers around the world
North Korea-linked Lazarus APT targets energy providers around the worldNorth Korea-linked Lazarus APT group is targeting energy providers around the world, including organizations in the US, Canada, and...
Outdoor Clothing Brand, The North Face, Hit With Credential Stuffing Attack
Outdoor Clothing Brand, The North Face, Hit With Credential Stuffing AttackThe North Face, an outdoor clothing brand, was the victim of a large-scale credential stuffing attack....
“Pwned”, the Book, is Finally Here!
"Pwned", the Book, is Finally Here!The first time I ever wrote publicly about a company's security vulnerabilities, my boss came to have a word with me...
Golang-Based Agenda Ransomware Detection: New Strain Began Sweeping Across Asia and Africa
Golang-Based Agenda Ransomware Detection: New Strain Began Sweeping Across Asia and Africa Researchers warn of a new ransomware family: a novel strain called Agenda sails in,...
DangerousSavanna Detection: Attacks Targeting Various Financial Orgs Revealed
DangerousSavanna Detection: Attacks Targeting Various Financial Orgs Revealed Security analysts revealed a two-year-long spear-phishing campaign aimed at entities in the financial sector in French-speaking African countries...
New Mirai Botnet Variant Detection: MooBot Sample Targets D-Link Routers
New Mirai Botnet Variant Detection: MooBot Sample Targets D-Link Routers Security researchers are raising the alarm on a new Mirai botnet variant dubbed MooBot that targets...
Smashing Security podcast #288: Chiquita banana, dumb criminals, and detecting ring binders
Smashing Security podcast #288: Chiquita banana, dumb criminals, and detecting ring bindersStudents learn a valuable lesson when it comes to AI detecting guns on campus, SIM...
Warning issued about Vice Society ransomware gang after attacks on schools
Warning issued about Vice Society ransomware gang after attacks on schoolsA ransomware gang that has been increasingly disproportionately targeting the education sector is the subject of...
Facebook Has No Idea What Data It Has
Facebook Has No Idea What Data It HasThis is from a court deposition: Facebook’s stonewalling has been revealing on its own, providing variations on the same...
Strong Password Ideas to Keep Your Information Safe
Strong Password Ideas to Keep Your Information Safe Password protection is one of the most common security protocols available. By creating a unique password, you are...
What Is Synthetic Identity Theft?
What Is Synthetic Identity Theft? It’s too bad cybercriminals don’t funnel their creativity into productive pursuits because they’re constantly coming up with nefarious new ways to...
A Parent’s Guide To The Metaverse – Part Two
A Parent’s Guide To The Metaverse – Part Two Welcome back to part 2 of my Metaverse series. If you are after tips and strategies to...
Fuzzing beyond memory corruption: Finding broader classes of vulnerabilities automatically
Fuzzing beyond memory corruption: Finding broader classes of vulnerabilities automaticallyPosted by Jonathan Metzman, Dongge Liu and Oliver Chang, Google Open Source Security Team Recently, OSS-Fuzz—our community...
Our Quest: Advancing Product Labels to Help Consumers Consider Cybersecurity
Our Quest: Advancing Product Labels to Help Consumers Consider CybersecurityFor many decades, consumers have relied on labels to help them make decisions about which products to...
Cisco won’t fix authentication bypass zero-day in EoL routers
Cisco won’t fix authentication bypass zero-day in EoL routersCisco says that a new authentication bypass flaw affecting multiple small business VPN routers will not be patched...
HP fixes severe bug in pre-installed Support Assistant tool
HP fixes severe bug in pre-installed Support Assistant toolHP issued a security advisory alerting users about a newly discovered vulnerability in HP Support Assistant, a software...

























