Software Factories and Bills of Materials Other manufacturing factories require bills of materials, so too, do software development factories, says Michel Genard, acting CPO at Lynx...
Month: February 2023
USENIX Security ’22 – ‘Who Are You (I Really Wanna Know)? Detecting Audio DeepFakes Through Vocal Tract Reconstruction’
USENIX Security ’22 – ‘Who Are You (I Really Wanna Know)? Detecting Audio DeepFakes Through Vocal Tract Reconstruction’Complete Title: 'USENIX Security '22 - Logan Blue, Kevin...
Why Small and Medium Sized Businesses Need More Than Just an AntiVirus Solution
Why Small and Medium Sized Businesses Need More Than Just an AntiVirus Solution As the size and scope of cybercriminal activity continues to grow, small and...
LogRhythm Applauded by Frost & Sullivan for Its Competitive Strategies and Industry-leading Solutions that Meet Customers’ Security and Compliance Needs
LogRhythm Applauded by Frost & Sullivan for Its Competitive Strategies and Industry-leading Solutions that Meet Customers’ Security and Compliance NeedsSAN ANTONIO – February 16, 2022 – Recently, Frost...
Fortinet FortiNAC CVE-2022-39952 flaw exploited in the wild hours after the release of PoC exploit
Fortinet FortiNAC CVE-2022-39952 flaw exploited in the wild hours after the release of PoC exploitThreat actors are actively exploiting the Fortinet FortiNAC vulnerability CVE-2022-39952 a few...
The alleged author of NLBrute Malware was extradited to US from Georgia
The alleged author of NLBrute Malware was extradited to US from GeorgiaDariy Pankov, a Russian VXer behind the NLBrute malware, has been extradited to the United...
Why Ransomware Costs Need to be Prioritized in Your 2023 Budget
Why Ransomware Costs Need to be Prioritized in Your 2023 BudgetBy Anurag Lal, CEO and President of NetSfere No one expects a hostage takeover, ever. Businesses...
4 Key Security Trends For 2023
4 Key Security Trends For 2023By Jonathan Lee, Senior Product Manager, Menlo Security 2022 has unfortunately failed to live up to hopes for calmer waters. While...
Pirated Final Cut Pro infects your Mac with cryptomining malware
Pirated Final Cut Pro infects your Mac with cryptomining malwareSecurity researchers discovered a cryptomining operation targeting macOS with a malicious version of Final Cut Pro that remains...
Valve “honeypot” used to ban 40,000 Dota 2 players using cheat
Valve “honeypot” used to ban 40,000 Dota 2 players using cheatGame developer Valve has announced that it permanently banned more than 40,000 accounts for using cheating software...
Ukraine says Russian hackers backdoored govt websites in 2021
Ukraine says Russian hackers backdoored govt websites in 2021The Computer Emergency Response Team of Ukraine (CERT-UA) says Russian state hackers have breached multiple government websites this week using...
Forsage DeFi platform founders indicted for $340 million scam
Forsage DeFi platform founders indicted for $340 million scamA Federal grand jury in the District of Oregon has indicted four Russian nationals founders of Forsage decentralized finance...
FTC: Americans lost $8.8 billion to fraud in 2022 after 30% surge
FTC: Americans lost $8.8 billion to fraud in 2022 after 30% surgeThe U.S. Federal Trade Commission (FTC) revealed today that Americans lost almost $8.8 billion to...
Microsoft urges Exchange admins to remove some antivirus exclusions
Microsoft urges Exchange admins to remove some antivirus exclusionsMicrosoft says some antivirus exclusions previously recommended for Exchange servers should be removed to boost their security. [...]Read MoreBleepingComputerMicrosoft says some antivirus exclusions previously recommended for Exchange...
TELUS investigating leak of stolen source code, employee data
TELUS investigating leak of stolen source code, employee dataCanada's second-largest telecom, TELUS is investigating a potential data breach after a threat actor shared samples online of what...
Executives make the case for continued tech investments
Executives make the case for continued tech investmentsEXECUTIVE SUMMARY: In the past, cyber security executives have received the financial support needed to keep organizations protected against...
Medibank hacker says ransom demand was US$10m as purported abortion health records posted
Medibank hacker says ransom demand was US$10m as purported abortion health records postedPost on blog linked to Russian ransomware group says it offered ‘discount’ ransom to...
Headwinds Don’t Have to Be a Drag on Your Security Effectiveness
Headwinds Don't Have to Be a Drag on Your Security EffectivenessDespite increased threats, an uncertain economy, and increasing automation, your organization can still thrive.Read MoreDark ReadingDespite...
Xcitium Brings ‘Zero Dwell’ Capability to Legacy EDR Platforms
Xcitium Brings 'Zero Dwell' Capability to Legacy EDR PlatformsPost ContentRead MoreDark Reading
Metomic Raises $20 Million to Protect Sensitive Data in SaaS Applications
Metomic Raises $20 Million to Protect Sensitive Data in SaaS ApplicationsAs a data security solution focused solely on SaaS ecosystems, Metomic will use the Series A...
Cris Thomas: Space Rogue, From L0pht Hacker to IBM Security Influencer
Cris Thomas: Space Rogue, From L0pht Hacker to IBM Security InfluencerSecurity Pro File: The old-school hacker traces a path from young hardware tinkerer to senior cybersecurity...
Vault Vision Launches One Click Passwordless Logins With Passkey User Authentication
Vault Vision Launches One Click Passwordless Logins With Passkey User AuthenticationEliminate passwords in user authentication workflow with Vault Vision's passkey features like facial recognition, fingerprint and...
Hydrochasma Threat Group Bombards Targets With Slew of Commodity Malware, Tools
Hydrochasma Threat Group Bombards Targets With Slew of Commodity Malware, ToolsA previously unidentified threat group uses open source malware and phishing to conduct cyber-espionage on shipping...
Unanswered Questions Cloud the Recent Targeting of an Asian Research Org
Unanswered Questions Cloud the Recent Targeting of an Asian Research OrgA novel threat group, utilizing new malware, is out in the wild. But the who, what,...
Wiper Malware Surges Ahead, Spiking 53% in 3 Months
Wiper Malware Surges Ahead, Spiking 53% in 3 MonthsCybercriminals and hacktivists have joined state-backed actors in using sabotage-bent malware in destructive attacks, new report shows.Read MoreDark...
Generative AI Changes Everything We Know About Cyberattacks
Generative AI Changes Everything We Know About CyberattacksGenerative AI is heating up everywhere and fundamentally changing everything we know about how cybercriminals develop and deploy attacks.Read...
UL Solutions Issues Automotive Cybersecurity Assurance Program Certificate to LG Innotek
UL Solutions Issues Automotive Cybersecurity Assurance Program Certificate to LG InnotekThrough its Cybersecurity Assurance Program, UL Solutions is helping the automotive industry advance cybersecurity management systems...
Linux Foundation Europe Announces Formation of OpenWallet Foundation
Linux Foundation Europe Announces Formation of OpenWallet FoundationDiverse ecosystem of global technology, finance, and university leaders join as first OpenWallet Foundation Members, many more expected.Read MoreDark...
Cyberattack on Dole Causes Temporary Salad Shortage
Cyberattack on Dole Causes Temporary Salad ShortageThe produce company said it suffered a ransomware attack earlier this month.Read MoreDark ReadingThe produce company said it suffered a...
Forsage Founders Indicted in $340M DeFi Crypto Scheme
Forsage Founders Indicted in $340M DeFi Crypto SchemePost ContentRead MoreDark Reading
