Why good email security is essential for every businessUnderstand the most dangerous threats to email security and how to combat them & learn how to gain...
Month: January 2023
Adopting GRC and cyber security to help facilitate enterprise risk management
Adopting GRC and cyber security to help facilitate enterprise risk managementDiscover the importance of both narrow and broad GRC views, the obstacles to acheivng true enterprise...
The Week in Ransomware – January 27th 2023 – ‘We hacked the hackers’
The Week in Ransomware - January 27th 2023 - 'We hacked the hackers'For the most part, this week has been relatively quiet regarding ransomware attacks and...
FBI takes down Hive ransomware group
FBI takes down Hive ransomware groupWorking with international law enforcement, the FBI said it has seized control of the servers the Hive group uses to communicate...
Are smart devices cyber secure?
Are smart devices cyber secure?Cyber Security Hub explores whether smart devices are cyber secure enough to withstand increasingly sophisticated cyber attacksLeer másArticles RSS FeedCyber Security Hub...
Top tips for employee cyber security training
Top tips for employee cyber security trainingDiscover how to better engage employees during cyber security trainingLeer másArticles RSS FeedDiscover how to better engage employees during cyber...
Sustaining Digital Certificate Security – TrustCor Certificate Distrust
Sustaining Digital Certificate Security - TrustCor Certificate DistrustPosted by Chrome Root Program, Chrome Security Team Note: This post is a follow-up to discussions carried out on...
CISO strategies and tactics for incident response
CISO strategies and tactics for incident responseAn exploration of how incident response, mindset, strategy, tactics and tech have evolvedLeer másArticles RSS FeedAn exploration of how incident...
Microsoft: Update On-Premises Exchange Server Now
Microsoft: Update On-Premises Exchange Server NowAttacks are not going away, tech giant warnsLeer másAttacks are not going away, tech giant warns
Global Action “Dismantles” Hive Ransomware Group
Global Action "Dismantles" Hive Ransomware GroupFBI distributes hundreds of decryption keys to victimsLeer másFBI distributes hundreds of decryption keys to victims
VMware vRealize Log Insight VMSA-2023-0001 IOCs
VMware vRealize Log Insight VMSA-2023-0001 IOCsIntroduction The recent VMware VMSA describes four new CVEs affecting VMware vRealize Log Insight. Three of these CVEs can be combined...
CVE-2023-23560 flaw exposes 100 Lexmark printer models to hack
CVE-2023-23560 flaw exposes 100 Lexmark printer models to hackLexmark released a security firmware update to fix a remote code execution flaw, tracked as CVE-2023-23560, that impacts...
Hacker accused of having stolen personal data of all Austrians and more
Hacker accused of having stolen personal data of all Austrians and moreA Dutch hacker who was arrested at the end of last year claims to have...
Patch management is crucial to protect Exchange servers, Microsoft warns
Patch management is crucial to protect Exchange servers, Microsoft warnsMicrosoft warns customers to patch their Exchange servers because attackers always look to exploit unpatched installs. Microsoft...
Hive Ransomware Infrastructure Seized in Joint International Law Enforcement Effort
Hive Ransomware Infrastructure Seized in Joint International Law Enforcement EffortIn what's a case of hacking the hackers, the darknet infrastructure associated with the Hive ransomware-as-a-service (RaaS)...
Security is Key to Business Transformation, Say IT Chiefs
Security is Key to Business Transformation, Say IT ChiefsTwo-fifths see it as a critical innovation driverLeer másTwo-fifths see it as a critical innovation driver
USENIX Security ’22 – R. Spencer Hallyburton, Yupei Liu, Yulong Cao, Z. Morley Mao, Miroslav Pajic – ‘Security Analysis of Camera-LiDAR Fusion Against Black-Box Attacks on Autonomous Vehicles’
USENIX Security ’22 – R. Spencer Hallyburton, Yupei Liu, Yulong Cao, Z. Morley Mao, Miroslav Pajic – ‘Security Analysis of Camera-LiDAR Fusion Against Black-Box Attacks on...
New ‘Pig Butchering’ Scam in West Africa Impersonates US Financial Advisors
New 'Pig Butchering' Scam in West Africa Impersonates US Financial AdvisorsDomainTools said most of these attacks exploited professional network services such as LinkedInLeer másDomainTools said most...
British Cyber Agency Warns of Russian and Iranian Hackers Targeting Key Industries
British Cyber Agency Warns of Russian and Iranian Hackers Targeting Key IndustriesThe U.K. National Cyber Security Centre (NCSC) on Thursday warned of spear-phishing attacks mounted by...
Why your data is more valuable than you may realize
Why your data is more valuable than you may realizeThe data trail you leave behind whenever you're online is bigger – and more revealing – than...
Black Basta Deploys PlugX Malware in USB Devices With New Technique
Black Basta Deploys PlugX Malware in USB Devices With New TechniqueThe variant is “wormable” and can infect USB devices to hide itself from the Windows OSLeer...
Multiple Vulnerabilities Found In Healthcare Software OpenEMR
Multiple Vulnerabilities Found In Healthcare Software OpenEMRTwo of these vulnerabilities combined could lead to unauthenticated remote code executionLeer másTwo of these vulnerabilities combined could lead to...
FBI takes down Hive ransomware group in an undercover operation
FBI takes down Hive ransomware group in an undercover operationThe US Department of Justice (DOJ) along with international partners has taken down the Hive ransomware group....
Kevin Mitnick Hacked California Law in 1983
Kevin Mitnick Hacked California Law in 1983Early in his career, Kevin Mitnick successfully hacked California law. He told me the story when he heard about my...
CBA AND FIDO: One, Other, or Both?
CBA AND FIDO: One, Other, or Both?Overview – A Pragmatic FIDO Approach There are a number of articles that discuss FIDO... The post CBA AND FIDO:...
There’s No There There….Or is There? You Won’t Find Out With DLP
There’s No There There….Or is There? You Won’t Find Out With DLPOver the past weeks, the discovery of classified documents in the homes of current, and...
3 Lifehacks While Analyzing Orcus RAT in a Malware Sandbox
3 Lifehacks While Analyzing Orcus RAT in a Malware SandboxOrcus is a Remote Access Trojan with some distinctive characteristics. The RAT allows attackers to create plugins and...
Hackers abuse legitimate remote monitoring and management tools in attacks
Hackers abuse legitimate remote monitoring and management tools in attacksSecurity researchers warn that an increasing number of attackers are using legitimate remote monitoring and management (RMM)...
Clarification of Obligations for the Use of Online Tracking Technologies by HIPAA Covered Entities and Business Associates
Clarification of Obligations for the Use of Online Tracking Technologies by HIPAA Covered Entities and Business AssociatesThe Office for Civil Rights (OCR) within the U.S. Department...
Researchers Discover New PlugX Malware Variant Spreading via Removable USB Devices
Researchers Discover New PlugX Malware Variant Spreading via Removable USB DevicesCybersecurity researchers have uncovered a PlugX sample that employs sneaky methods to infect attached removable USB...


























