Facebook Shuts Down Covert Political 'Influence Operations' from Russia and ChinaMeta Platforms on Tuesday disclosed it took steps to dismantle two covert influence operations originating from...
Year: 2022
Cyber Criminals Using Quantum Builder Sold on Dark Web to Deliver Agent Tesla Malware
Cyber Criminals Using Quantum Builder Sold on Dark Web to Deliver Agent Tesla MalwareA recently discovered malware builder called Quantum Builder is being used to deliver...
Improve your security posture with Wazuh, a free and open source XDR
Improve your security posture with Wazuh, a free and open source XDROrganizations struggle to find ways to keep a good security posture. This is because it...
LeakBase: India Swachhata Platform Breached, 16 Million User PII Records Exposed
LeakBase: India Swachhata Platform Breached, 16 Million User PII Records ExposedData samples contain email addresses, hashed passwords and user IDs, other PIILeer másData samples contain email...
Researchers Warn of New Go-based Malware Targeting Windows and Linux Systems
Researchers Warn of New Go-based Malware Targeting Windows and Linux SystemsA new, multi-functional Go-based malware dubbed Chaos has been rapidly growing in volume in recent months to ensnare...
Five Steps to Mitigate the Risk of Credential Exposure
Five Steps to Mitigate the Risk of Credential ExposureEvery year, billions of credentials appear online, be it on the dark web, clear web, paste sites, or...
Swachh City Platform Suffers Data Breach Leaking 16 Million User Records
Swachh City Platform Suffers Data Breach Leaking 16 Million User RecordsA threat actor by the name of LeakBase has shared a database containing personal information allegedly...
Hackers Aid Protests Against Iranian Government with Proxies, Leaks and Hacks
Hackers Aid Protests Against Iranian Government with Proxies, Leaks and HacksSeveral hacktivist groups are using Telegram and other tools to aid anti-government protests in Iran to...
Government, Union-Themed Lures Used to Deliver Cobalt Strike Payloads
Government, Union-Themed Lures Used to Deliver Cobalt Strike PayloadsCisco Talos discovered the malicious campaign in August 2022Leer másCisco Talos discovered the malicious campaign in August 2022
Researchers Uncover Covert Attack Campaign Targeting Military Contractors
Researchers Uncover Covert Attack Campaign Targeting Military ContractorsA new covert attack campaign singled out multiple military and weapons contractor companies with spear-phishing emails to trigger a...
Optus breach – Aussie telco told it will have to pay to replace IDs
Optus breach – Aussie telco told it will have to pay to replace IDsLicence compromised? Passport number burned? Need a new one? Who's going to pay?Leer...
WhatsApp “zero-day exploit” news scare – what you need to know
WhatsApp “zero-day exploit” news scare – what you need to knowIs WhatsApp currently under active attack by cybercriminals? Is this a clear and current danger? How...
Brazilian Prilex Hackers Resurfaced With Sophisticated Point-of-Sale Malware
Brazilian Prilex Hackers Resurfaced With Sophisticated Point-of-Sale MalwareA Brazilian threat actor known as Prilex has resurfaced after a year-long operational hiatus with an advanced and complex malware to...
S3 Ep102: Cutting through cybersecurity news hype [Audio + Transcript]
S3 Ep102: Cutting through cybersecurity news hype [Audio + Transcript]Latest episode - listen now! Tell fact from fiction in hyped-up cybersecurity news...Leer másNaked SecurityLatest episode -...
Researchers Discover Chaos, a Golang Multipurpose Botnet
Researchers Discover Chaos, a Golang Multipurpose BotnetThe tool was written in Chinese and seemed China-based due to its C2 infrastructureLeer másThe tool was written in Chinese...
8 mistakes CIOs make and how to avoid them
8 mistakes CIOs make and how to avoid themFrom driving transformative change, to sharing insights into the political nature of the role, IT leaders and advisors...
CloudBees CEO: Software delivery is now ‘release orchestration’
CloudBees CEO: Software delivery is now ‘release orchestration’Enterprise software delivery company CloudBees has a new SaaS offering to discuss, and the firm's CEO gets philosophical. The...
Essential best practices: Securing critical national infrastructure
Essential best practices: Securing critical national infrastructureBy Deryck Mitchelson, Field CISO EMEA, Check Point Software Technologies. Last week, news reports indicated that a European government agency...
The Troublemaker CISO: How Much Profit Equals One Life?
The Troublemaker CISO: How Much Profit Equals One Life?Security Director Ian Keller Rants About Hospital Networks Being Internet-Connected"It's stupid and adds zero value," writes Ian Keller,...
Launch an IT career after taking these eight courses for under $50
Launch an IT career after taking these eight courses for under $50Get a great deal on 110 hours of IT training in these online courses focused...
American Airlines learns breach caused by phishing
American Airlines learns breach caused by phishingEXECUTIVE SUMMARY: The US airline, which reportedly owns the world’s largest fleet of aircraft, has fallen prey to a phishing...
Stronger Cloud Security in Azure Functions Using Custom Cloud Container
Stronger Cloud Security in Azure Functions Using Custom Cloud ContainerIn this entry, we discuss how developers can use custom cloud container image and the distroless approach...
How hardware impacts cyber security
How hardware impacts cyber securityBy Zac Amos, Features Editor, Rehack.com. Cyber security has been an important topic for over two decades, but as data breaches continue to...
Report finds women are declining CISO/CSO roles
Report finds women are declining CISO/CSO rolesProfessional risk factors into career decisions, and successful women need to encourage other women to accept the risks, says Accenture....
Cyberwar: Assessing the Geopolitical Playing Field
Cyberwar: Assessing the Geopolitical Playing FieldThe United States is arguably involved in a cyberwar against Russia and China - and appears to be losing. In this...
Adware installed 13 million times + how to uninstall it
Adware installed 13 million times + how to uninstall itEXECUTIVE SUMMARY: Cyber security researchers have discovered and disrupted a mobile ad fraud campaign involving nearly 100...
Hacker breaches Fast Company, sending offensive notifications
Hacker breaches Fast Company, sending offensive notificationsEXECUTIVE SUMMARY: The business publication known as Fast Company has confirmed that an unauthorized person recently compromised the company’s technology...
Fired admin cripples former employer’s network using old credentials
Fired admin cripples former employer's network using old credentialsAn IT system administrator of a prominent financial company based in Hawaii, U.S., used a pair of credentials...
Examining What Went Wrong for Optus
Examining What Went Wrong for OptusThe latest edition of the ISMG Security Report discusses what went wrong for Optus in the wake of one of Australia's...
Remote work security statistics in 2022
Remote work security statistics in 2022By Pete Nicoletti, Field CISO Americas, Check Point Software. After two years of having our businesses and lives impacted by the...

























