AUVSI Launches Green UAS Cybersecurity Certification Program For Commercial DronesPost ContentRead MoreDark Reading
Month: February 2023
87% of Container Images in Production Have Critical or High-Severity Vulnerabilities
87% of Container Images in Production Have Critical or High-Severity VulnerabilitiesAt the inaugural CloudNativeSecurityCon, DevSecOps practitioners discussed how to shore up the software supply chain.Read MoreDark...
Student Medical Records Exposed After LAUSD Breach
Student Medical Records Exposed After LAUSD Breach"Hundreds" of special education students' psych records have turned up on the Dark Web. School records like these are covered...
Pirated Final Cut Pro for macOS Offers Stealth Malware Delivery
Pirated Final Cut Pro for macOS Offers Stealth Malware DeliveryThe number of people who have made the weaponized software available for sharing via torrent suggests that...
LA School District Confirms Student Data Leaked in Attack
LA School District Confirms Student Data Leaked in AttackAdmission Comes After Release of Report Finding Sensitive Records on Dark Web SiteThe Los Angeles Unified School District...
The Security Perks and Perils of OpenAI on Microsoft Bing
The Security Perks and Perils of OpenAI on Microsoft BingOpenAI on Bing Carries Code and Traffic Risks But Will Also Simplify Code AnalysisEmbedding OpenAI technology in...
Cryptohack Roundup: Hope Finance, Platypus and Coinbase
Cryptohack Roundup: Hope Finance, Platypus and CoinbasePlus, New Malware That Demands Crypto PaymentsEvery week, Information Security Media Group rounds up cybersecurity incidents in the world of...
NLBrute Malware Developer Pleads Not Guilty in US Court
NLBrute Malware Developer Pleads Not Guilty in US CourtNLBrute Used to Perpetuate Ransomware AttacksA Russian national accused by U.S. federal prosecutors of developing an application for...
Es probable que Lazarus Group use la nueva puerta trasera WinorDLL64 para filtrar datos confidenciales
Es probable que Lazarus Group use la nueva puerta trasera WinorDLL64 para filtrar datos confidencialesSe ha descubierto una nueva puerta trasera asociada con un descargador de...
⚡ Top Cybersecurity News Stories This Week — Cybersecurity Newsletter
⚡Top Cybersecurity News Stories This Week — Cybersecurity NewsletterHey ? there, cyber friends! Welcome to this week's cybersecurity newsletter, where we aim to keep you informed and...
GoDaddy Discloses Multi-Year Security Breach Causing Malware Installations and Source Code Theft
GoDaddy Discloses Multi-Year Security Breach Causing Malware Installations and Source Code TheftWeb hosting services provider GoDaddy on Friday disclosed a multi-year security breach that enabled unknown...
Experts Warn of RambleOn Android Malware Targeting South Korean Journalists
Experts Warn of RambleOn Android Malware Targeting South Korean JournalistsSuspected North Korean nation-state actors targeted a journalist in South Korea with a malware-laced Android app as...
Twitter Limits SMS-Based 2-Factor Authentication to Blue Subscribers Only
Twitter Limits SMS-Based 2-Factor Authentication to Blue Subscribers OnlyTwitter has announced that it's limiting the use of SMS-based two-factor authentication (2FA) to its Blue subscribers. "While...
Samsung Introduces New Feature to Protect Users from Zero-Click Malware Attacks
Samsung Introduces New Feature to Protect Users from Zero-Click Malware AttacksSamsung has announced a new feature called Message Guard that comes with safeguards to protect users...
Fortinet Issues Patches for 40 Flaws Affecting FortiWeb, FortiOS, FortiNAC, and FortiProxy
Fortinet Issues Patches for 40 Flaws Affecting FortiWeb, FortiOS, FortiNAC, and FortiProxyFortinet has released security updates to address 40 vulnerabilities in its software lineup, including FortiWeb, FortiOS, FortiNAC,...
Google Reveals Alarming Surge in Russian Cyber Attacks Against Ukraine
Google Reveals Alarming Surge in Russian Cyber Attacks Against UkraineRussia's cyber attacks against Ukraine surged by 250% in 2022 when compared to two years ago, Google's...
Cyber Espionage Group Earth Kitsune Deploys WhiskerSpy Backdoor in Latest Attacks
Cyber Espionage Group Earth Kitsune Deploys WhiskerSpy Backdoor in Latest AttacksThe cyber espionage threat actor tracked as Earth Kitsune has been observed deploying a new backdoor called WhiskerSpy...
How to Detect New Threats via Suspicious Activities
How to Detect New Threats via Suspicious ActivitiesUnknown malware presents a significant cybersecurity threat and can cause serious damage to organizations and individuals alike. When left...
Reddit admits it was hacked and data stolen, says “Don’t panic”
Reddit admits it was hacked and data stolen, says “Don’t panic”Reddit is suggesting three tips as a follow-up to this breach. We agree with two of...
Acunetix improves default roles
Acunetix improves default rolesA new Acunetix Premium update has been released for Windows and Linux: 15.4 This Acunetix release improves the default roles. Acunetix offers role-based access...
The Top 10 Cybersecurity Dashboard Metrics Every CIO Needs to Know
The Top 10 Cybersecurity Dashboard Metrics Every CIO Needs to Know As cybersecurity continues to become a more significant focus for organizations, other C-suite leaders must...
Weak Creds, Unpatched Flaws, Reliance on Tools Plagued Orgs in 2022
Weak Creds, Unpatched Flaws, Reliance on Tools Plagued Orgs in 2022 Organizations often either have weak credential policies or don’t enforce them, making it easy for...
Escaping well-configured VSCode extensions (for profit)
Escaping well-configured VSCode extensions (for profit)By Vasco Franco In part one of this two-part series, we escaped Webviews in real-world misconfigured VSCode extensions. But can we...
Can’t Stay PCI Compliant? Consider a PCI Charter
Can’t Stay PCI Compliant? Consider a PCI Charter Does this sound familiar? You’ve gotten your Report on Compliance (RoC), but you’re dreading the next assessment because...
How to Create a GDPR Data Protection Policy
How to Create a GDPR Data Protection PolicyIn this blog, we will discuss what GDPR compliance entails and provide tips on how to create an effective...
SLSA and Developer Productivity Meet in 2023
SLSA and Developer Productivity Meet in 2023 As cyberattacks rise, software organizations must proactively reduce vulnerabilities and ‘shift left’ to harden their entire software delivery life...
VPN Alternatives
VPN AlternativesIs there a better option than VPN? Virtual Private Networks (VPN) have been widely used as a solution for secure remote access for decades. However,...
Do Hardened Systems Need FIM?
Do Hardened Systems Need FIM? In a recent podcast interview with Hillarie McClure, Multimedia Director of Cybercrime Magazine, Robert E. Johnson III, Cimcor CEO/President, addresses whether...
The Top 5 Ways to Secure Your Snowflake Environment
The Top 5 Ways to Secure Your Snowflake Environment The world is increasingly built on data. An estimated 120 zettabytes will be created, captured, copied, and...
EnterpriseDB adds Transparent Data Encryption to PostgreSQL
EnterpriseDB adds Transparent Data Encryption to PostgreSQLThe new Transparent Data Encryption (TDE) feature will be shipped along with the company’s enterprise version of its database.Read MoreCSO...
