Blockchain Security: Can You Trust This Technology?Is Blockchain Technology Really Secure? By Alexandr Khomich, CEO at Andersen Blockchain is considered one of the most […] The...
Year: 2022
What Is DNS Scavenging?
What Is DNS Scavenging?DNS scavenging is the process of removing stale DNS records, usually used together with DNS aging in order to free up space and...
Cybersecurity, Data Management and Insufficient Systems Listed as Top Concerns for Risk Professionals
Cybersecurity, Data Management and Insufficient Systems Listed as Top Concerns for Risk ProfessionalsDiligent is the global leader in modern governance providing SaaS solutions across governance, risk,...
SOC Prime’s Cyber Monday Deal 2022: Get Bonus Sigma Rules of Your Choice & Unlimited Hunting Capabilities
SOC Prime’s Cyber Monday Deal 2022: Get Bonus Sigma Rules of Your Choice & Unlimited Hunting Capabilities We are thrilled to announce our Cyber Monday promotion...
Continuous Exposure Management: Flipping the Script on Cybersecurity
Continuous Exposure Management: Flipping the Script on CybersecurityBy Brett Kelsey, CEO, Reveald Hackers recently exploited flaws in the Binance blockchain to steal $570 million and […]...
Google Chrome extension used to steal cryptocurrency, passwords
Google Chrome extension used to steal cryptocurrency, passwordsAn information-stealing Google Chrome browser extension named 'VenomSoftX' is being deployed by Windows malware to steal cryptocurrency and clipboard...
Earth Preta aka Mustang Panda Attack Detection: Abused Fake Google Accounts in Spear-Phishing Campaigns Targeting Governments Worldwide
Earth Preta aka Mustang Panda Attack Detection: Abused Fake Google Accounts in Spear-Phishing Campaigns Targeting Governments Worldwide The infamous China-linked Earth Preta (aka Mustang Panda, Bronze...
Ouch! Ransomware gang says it won’t attack AirAsia again due to the “chaotic organisation” and sloppy security of hacked company’s network
Ouch! Ransomware gang says it won’t attack AirAsia again due to the “chaotic organisation” and sloppy security of hacked company’s networkThe Daixin ransomware gang has given...
Black Friday deal: Get 50% off Malwarebytes Premium, Privacy VPN
Black Friday deal: Get 50% off Malwarebytes Premium, Privacy VPNMalwarebytes' Black Friday deal is now live, offering a 50% discount on the Malwarebytes Premium antivirus + Malwarebytes Privacy VPN bundle...
Apple’s Device Analytics Can Identify iCloud Users
Apple’s Device Analytics Can Identify iCloud UsersResearchers claim that supposedly anonymous device analytics information can identify users: On Twitter, security researchers Tommy Mysk and Talal Haj...
Hackers steal $300,000 in DraftKings credential stuffing attack
Hackers steal $300,000 in DraftKings credential stuffing attackSports betting company DraftKings said today that it would make whole customers affected by a credential stuffing attack that led to...
Attackers bypass Coinbase and MetaMask 2FA via TeamViewer, fake support chat
Attackers bypass Coinbase and MetaMask 2FA via TeamViewer, fake support chatA crypto-stealing phishing campaign is underway to bypass multi-factor authentication and gain access to accounts on...
9 VOIP security best practices to consider for your business
9 VOIP security best practices to consider for your businessIs VOIP secure? Can VOIP be hacked? Learn about why VOIP security is important and the best...
Microsoft Defender protects Mac and Linux from malicious websites
Microsoft Defender protects Mac and Linux from malicious websitesNow that attackers can phish employees on any device and try to extract credentials, endpoint protection has to...
Aurora infostealer malware increasingly adopted by cybergangs
Aurora infostealer malware increasingly adopted by cybergangsCybercriminals are increasingly turning to a new Go-based information stealer named 'Aurora' to steal sensitive information from browsers and cryptocurrency apps,...
How to minimize security risks: Follow these best practices for success
How to minimize security risks: Follow these best practices for successTo reduce security threats within your organization, you must prioritize security risk management. Here are some...
Two Estonians arrested for running $575M crypto Ponzi scheme
Two Estonians arrested for running $575M crypto Ponzi schemeTwo Estonian nationals were arrested in Tallinn, Estonia, on Sunday after being indicted in the U.S. for running a massive...
What is purple teaming and why is it useful?
What is purple teaming and why is it useful?EXECUTIVE SUMMARY: Networks are under attack and in recent years, securing IT networks and data has never presented...
Android file manager apps infect thousands with Sharkbot malware
Android file manager apps infect thousands with Sharkbot malwareA new collection of malicious Android apps posing as harmless file managers had infiltrated the official Google Play...
Harris Center ISO perspective: Product evaluation, board engagement & career advice
Harris Center ISO perspective: Product evaluation, board engagement & career adviceIn this interview, Wes Farris, Information Security Officer for the Harris Center for Mental Health and...
FIRESIDE CHAT: Anchoring security on granular visibility, proactive management of all endpoints
FIRESIDE CHAT: Anchoring security on granular visibility, proactive management of all endpointsEndpoints are where all are the connectivity action is. Related: Ransomware bombardments And securing endpoints...
Covering Data Breaches in an Ethical Way
Covering Data Breaches in an Ethical WayHow Do We Avoid Data Dump Voyeurism and Victim Shaming?Data breaches are tricky to cover, and we want to report...
Cybersecurity Analysis of the FTX Crypto Heist: Part Two
Cybersecurity Analysis of the FTX Crypto Heist: Part TwoOn the heels of the recent FTX financial meltdown came the theft of millions of dollars that left...
K05403841: BIG-IP and BIG-IQ improvements disclosed by Rapid7
K05403841: BIG-IP and BIG-IQ improvements disclosed by Rapid7BIG-IP and BIG-IQ improvements disclosed by Rapid7 Security Advisory Security Advisory Description BIG-IP and BIG-IQ improvements disclosed by Rapid7...
Digital Army 2030: US Army Modernizes Technology at Scale: Part 1
Digital Army 2030: US Army Modernizes Technology at Scale: Part 1In the first episode of this exclusive two-part series, Dr. Raj Iyer, CIO of the U.S....
Central Depository Attack Delays Trade Settlement in India
Central Depository Attack Delays Trade Settlement in IndiaSystems Are Back Online But Brokers Say Some Systems Are Still AffectedTrade-related services resumed Monday at Central Depository Services...
Chinese APT Using Google Drive, Dropbox to Drop Malware
Chinese APT Using Google Drive, Dropbox to Drop MalwareEvolved Mustang Panda Malware Targets Government, Education, Other Sectors GloballyA large-scale cyberespionage campaign by notorious China-based advanced persistent...
5 Hospital Workers Charged with Selling Patient Information
5 Hospital Workers Charged with Selling Patient InformationData of Patients Hurt in Auto Accidents Allegedly Sold to Chiropractors, AttorneysAuthorities charged six people, including five former Tennessee...
RSA CEO Rohit Ghai on Authenticating Users to Mobile Devices
RSA CEO Rohit Ghai on Authenticating Users to Mobile DevicesHow to Defend BYOD Devices Without Installing Software or Creating FrictionThe divide between mobile app detection and...
GUEST ESSAY: The rising need to defend against super hackers, master thieves and digital ghosts
GUEST ESSAY: The rising need to defend against super hackers, master thieves and digital ghostsConsider what might transpire if malicious hackers began to intensively leverage Artificial...



























