Tesla “Solar Factory” Implicated in FSD Fraud: Workers Directed to Classify Images for DrivingElon Musk launched the Tesla concept for chargers as solar powered. He promised...
Month: January 2023
Digital Trust Digest: This Week’s Must-Know News
Digital Trust Digest: This Week’s Must-Know NewsThe Digital Trust Digest is a curated overview of the week’s top cybersecurity news. Here's what happened the week of...
Step on It: What to Know About TISAX Compliance in the Automotive Market
Step on It: What to Know About TISAX Compliance in the Automotive MarketThe automotive industry is one of the largest in the world, with sales estimated...
5 Reasons to Consolidate Your Security Stack
5 Reasons to Consolidate Your Security StackHow SMEs Can Achieve Enterprise-Grade CybersecurityAlthough small to medium enterprises - SMEs - do not have the security resources larger...
Darknet Markets Using Custom Android Apps for Fulfillment
Darknet Markets Using Custom Android Apps for FulfillmentM-Club Used by at Least 7 Drug-Focused Russian-Language Markets, Researchers ReportDarknet markets offering illegal drugs and fraudster tools and...
Cloud email services bolster encryption against hackers
Cloud email services bolster encryption against hackersGoogle, Microsoft and Proton launched new end-to-end encryption products to confront the 50% increase in ransomware, phishing and other email-vector...
How to configure an SMTP server in a self-hosted instance Passbolt
How to configure an SMTP server in a self-hosted instance PassboltWith the self-hosted Passbolt password manager, you must configure an SMTP server to use the collaboration...
US Flights Resume After Reported Computer Glitch Resolved
US Flights Resume After Reported Computer Glitch ResolvedSeparately, UK's Royal Mail Blames 'Cyber Incident' for Service DisruptionAnytime critical infrastructure gets disrupted, the first question inevitably seems...
Recent 2022 cyberattacks presage a rocky 2023
Recent 2022 cyberattacks presage a rocky 2023A spate of zero-day exploits against Twitter, Rackspace and others late last year showed the limits of a cybersecurity workforce...
Security risk assessment checklist
Security risk assessment checklistOrganizations, regardless of size, face ever-increasing information technology and data security threats. Everything from physical sites to data, applications, networks and systems are...
Twitter: Latest Dump Has ‘Already Publicly Available’ Data
Twitter: Latest Dump Has 'Already Publicly Available' DataReports 'No Evidence' Twitter Flaw Exploited to Amass Latest Leaked Data on UsersTwitter says a massive collection of purported...
BCDR Buyer’s Guide For MSPs
BCDR Buyer’s Guide For MSPsWhen a client’s server goes down or is compromised in a cyberattack, managed service providers (MSPs) need an effective business continuity and...
Twitter claims leaked data of 200M users not stolen from its systems
Twitter claims leaked data of 200M users not stolen from its systemsTwitter finally addressed reports that a dataset of email addresses linked to hundreds of millions of...
Scattered Spider hackers use old Intel driver to bypass security
Scattered Spider hackers use old Intel driver to bypass securityA financially motivated threat actor tracked as Scattered Spider was observed attempting to deploy Intel Ethernet diagnostics...
Business Continuity and Disaster Recovery Solutions Built For Managed Service Providers
Business Continuity and Disaster Recovery Solutions Built For Managed Service ProvidersCritical business data lives on servers, personal devices, and in the cloud. If any of that...
SIRIS Business Continuity and Disaster Recovery
SIRIS Business Continuity and Disaster RecoverySIRIS is fundamentally different than traditional backup and recovery solutions. Utilizing a cloud-first approach, managed service providers (MSPs) can offer their...
Exclusive: FDA Leader on Impact of New Medical Device Law
Exclusive: FDA Leader on Impact of New Medical Device LawThe $1.7 trillion omnibus spending bill signed into law last week by President Joe Biden contains new...
Fortinet: Govt networks targeted with now-patched SSL-VPN zero-day
Fortinet: Govt networks targeted with now-patched SSL-VPN zero-dayFortinet says unknown attackers exploited a FortiOS SSL-VPN zero-day vulnerability patched last month in attacks against government organizations and...
Supporting the Use of Rust in the Chromium Project
Supporting the Use of Rust in the Chromium ProjectPosted by Dana Jansens (she/her), Chrome Security Team We are pleased to announce that moving forward, the Chromium...
Vice Society ransomware claims attack on Australian firefighting service
Vice Society ransomware claims attack on Australian firefighting serviceAustralia's Fire Rescue Victoria has disclosed a data breach caused by a December cyberattack that is now claimed...
Amazing little-known ways to drive sustainability, IT and security growth
Amazing little-known ways to drive sustainability, IT and security growthEXECUTIVE SUMMARY: Sustainable business practices – it’s not just another buzzword. It’s a business opportunity. Organizations are...
European police takes down call centers behind cryptocurrency scams
European police takes down call centers behind cryptocurrency scamsMultiple call centers across Europe controlled by a criminal organization involved in online investment fraud were taken down...
Ransomware attacks are decreasing, but companies remain vulnerable
Ransomware attacks are decreasing, but companies remain vulnerableOnly 25% of the organizations surveyed by Delinea were hit by ransomware attacks in 2022, but fewer companies are...
You don’t choose your battles, they choose you
You don’t choose your battles, they choose youThere is a fundamental problem within the cyber security world, a problem that Gil Shwed believes Check Point is...
OpenAI’s ChatGPT bot: The hazardous malware that it easily spits out
OpenAI’s ChatGPT bot: The hazardous malware that it easily spits outEXECUTIVE SUMMARY: Late last year, the company called OpenAI released an artificially intelligent chatbot that has...
Gootkit Loader Actively Targets Australian Healthcare Industry
Gootkit Loader Actively Targets Australian Healthcare IndustryWe analyzed the infection routine used in recent Gootkit loader attacks on the Australian healthcare industry and found that Gootkit...
MetaMask warns of new ‘Address Poisoning’ cryptocurrency scam
MetaMask warns of new 'Address Poisoning' cryptocurrency scamCryptocurrency wallet provider MetaMask is warning users of a new scam called 'Address Poisoning' used to trick users into...
Why Banks Find It Hard to Tackle Authorized Fraud
Why Banks Find It Hard to Tackle Authorized FraudAuthorized payment scams are on the rise, and banking regulators are putting pressure on financial institutions to do...
Explore information security with 97% off this huge course bundle
Explore information security with 97% off this huge course bundleThe training covers Docker, Splunk and AWS as you work toward CCSP certification. The post Explore information...
Microsoft: Cuba ransomware hacking Exchange servers via OWASSRF flaw
Microsoft: Cuba ransomware hacking Exchange servers via OWASSRF flawMicrosoft says Cuba ransomware threat actors are hacking their way into victims' networks via Microsoft Exchange servers unpatched against...
