⚡Top Cybersecurity News Stories This Week — Cybersecurity NewsletterHey ? there, cyber friends! Welcome to this week's cybersecurity newsletter, where we aim to keep you informed and...
Day: February 23, 2023
GoDaddy Discloses Multi-Year Security Breach Causing Malware Installations and Source Code Theft
GoDaddy Discloses Multi-Year Security Breach Causing Malware Installations and Source Code TheftWeb hosting services provider GoDaddy on Friday disclosed a multi-year security breach that enabled unknown...
Experts Warn of RambleOn Android Malware Targeting South Korean Journalists
Experts Warn of RambleOn Android Malware Targeting South Korean JournalistsSuspected North Korean nation-state actors targeted a journalist in South Korea with a malware-laced Android app as...
Twitter Limits SMS-Based 2-Factor Authentication to Blue Subscribers Only
Twitter Limits SMS-Based 2-Factor Authentication to Blue Subscribers OnlyTwitter has announced that it's limiting the use of SMS-based two-factor authentication (2FA) to its Blue subscribers. "While...
Samsung Introduces New Feature to Protect Users from Zero-Click Malware Attacks
Samsung Introduces New Feature to Protect Users from Zero-Click Malware AttacksSamsung has announced a new feature called Message Guard that comes with safeguards to protect users...
Fortinet Issues Patches for 40 Flaws Affecting FortiWeb, FortiOS, FortiNAC, and FortiProxy
Fortinet Issues Patches for 40 Flaws Affecting FortiWeb, FortiOS, FortiNAC, and FortiProxyFortinet has released security updates to address 40 vulnerabilities in its software lineup, including FortiWeb, FortiOS, FortiNAC,...
Google Reveals Alarming Surge in Russian Cyber Attacks Against Ukraine
Google Reveals Alarming Surge in Russian Cyber Attacks Against UkraineRussia's cyber attacks against Ukraine surged by 250% in 2022 when compared to two years ago, Google's...
Cyber Espionage Group Earth Kitsune Deploys WhiskerSpy Backdoor in Latest Attacks
Cyber Espionage Group Earth Kitsune Deploys WhiskerSpy Backdoor in Latest AttacksThe cyber espionage threat actor tracked as Earth Kitsune has been observed deploying a new backdoor called WhiskerSpy...
How to Detect New Threats via Suspicious Activities
How to Detect New Threats via Suspicious ActivitiesUnknown malware presents a significant cybersecurity threat and can cause serious damage to organizations and individuals alike. When left...
Reddit admits it was hacked and data stolen, says “Don’t panic”
Reddit admits it was hacked and data stolen, says “Don’t panic”Reddit is suggesting three tips as a follow-up to this breach. We agree with two of...
Acunetix improves default roles
Acunetix improves default rolesA new Acunetix Premium update has been released for Windows and Linux: 15.4 This Acunetix release improves the default roles. Acunetix offers role-based access...
The Top 10 Cybersecurity Dashboard Metrics Every CIO Needs to Know
The Top 10 Cybersecurity Dashboard Metrics Every CIO Needs to Know As cybersecurity continues to become a more significant focus for organizations, other C-suite leaders must...
Weak Creds, Unpatched Flaws, Reliance on Tools Plagued Orgs in 2022
Weak Creds, Unpatched Flaws, Reliance on Tools Plagued Orgs in 2022 Organizations often either have weak credential policies or don’t enforce them, making it easy for...
Escaping well-configured VSCode extensions (for profit)
Escaping well-configured VSCode extensions (for profit)By Vasco Franco In part one of this two-part series, we escaped Webviews in real-world misconfigured VSCode extensions. But can we...
Can’t Stay PCI Compliant? Consider a PCI Charter
Can’t Stay PCI Compliant? Consider a PCI Charter Does this sound familiar? You’ve gotten your Report on Compliance (RoC), but you’re dreading the next assessment because...
How to Create a GDPR Data Protection Policy
How to Create a GDPR Data Protection PolicyIn this blog, we will discuss what GDPR compliance entails and provide tips on how to create an effective...
SLSA and Developer Productivity Meet in 2023
SLSA and Developer Productivity Meet in 2023 As cyberattacks rise, software organizations must proactively reduce vulnerabilities and ‘shift left’ to harden their entire software delivery life...
VPN Alternatives
VPN AlternativesIs there a better option than VPN? Virtual Private Networks (VPN) have been widely used as a solution for secure remote access for decades. However,...
Do Hardened Systems Need FIM?
Do Hardened Systems Need FIM? In a recent podcast interview with Hillarie McClure, Multimedia Director of Cybercrime Magazine, Robert E. Johnson III, Cimcor CEO/President, addresses whether...
The Top 5 Ways to Secure Your Snowflake Environment
The Top 5 Ways to Secure Your Snowflake Environment The world is increasingly built on data. An estimated 120 zettabytes will be created, captured, copied, and...
EnterpriseDB adds Transparent Data Encryption to PostgreSQL
EnterpriseDB adds Transparent Data Encryption to PostgreSQLThe new Transparent Data Encryption (TDE) feature will be shipped along with the company’s enterprise version of its database.Read MoreCSO...
Attacks on industrial infrastructure on the rise, defenses struggle to keep up
Attacks on industrial infrastructure on the rise, defenses struggle to keep upThe last year saw a rise in the sophistication and number of attacks targeting industrial...
Defending against attacks on Azure AD: Goodbye firewall, hello identity protection
Defending against attacks on Azure AD: Goodbye firewall, hello identity protectionNot too long ago, guarding access to the network was the focal point of defense for...
Descope launches authentication and user management SaaS
Descope launches authentication and user management SaaSDescope has launched its first product, a platform designed to help developers add authentication and user management capabilities to their...
Cybersecurity startup Oligo debuts with new application security tech
Cybersecurity startup Oligo debuts with new application security techIsrael-based startup Oligo Security is exiting stealth mode with the public launch of its namesake software, offering a...
5 biggest risks of using third-party services providers
5 biggest risks of using third-party services providersAs business processes become more complex, companies are turning to third parties to boost their ability to provide critical...
China-based cyberespionage actor seen targeting South America
China-based cyberespionage actor seen targeting South AmericaChina-based cyberespionage actor DEV-0147 has been observed compromising diplomatic targets in South America, according to Microsoft’s Security Intelligence team. The...
5 top threats from 2022 most likely to strike in 2023
5 top threats from 2022 most likely to strike in 2023The threat landscape is highly diverse and attacks range in sophistication from the most basic scams...
Call of Duty Developer Confirms Phishing Attempt but Not Breach
Call of Duty Developer Confirms Phishing Attempt but Not BreachSecurity researchers say hackers successfully exfiltrated contentRead MoreSecurity researchers say hackers successfully exfiltrated content
Time Taken to Deploy Ransomware Drops 94%
Time Taken to Deploy Ransomware Drops 94%Extortion found to be most common impact from cyber-attacks in 2022Read MoreExtortion found to be most common impact from cyber-attacks...