US Official Reproaches Industry for Bad CybersecurityCISA Director Says Programming Language Swap Will End Memory Safety VulnerabilitiesA top U.S. government official urged industry to become more...
Month: February 2023
Online Shopping Cart Software Vulnerable: German BSI Report
Online Shopping Cart Software Vulnerable: German BSI ReportBSI Study Finds Outdated Software, Vulnerable JavaScript LibrariesAn assessment of online shopping cart software used by e-commerce sites performed...
Australia Centralizes Government Cybersecurity Response
Australia Centralizes Government Cybersecurity ResponseHome Affairs Minister Clare O'Neil Dings Cybersecurity Law as 'Bloody Useless'The Australian government says it will centralize its approach to securing federal...
Fortinet soluciona 40 fallas, 2 críticas con PoC CVE-2022-39952 (PARCHA YA!)
Fortinet soluciona 40 fallas, 2 críticas con PoC CVE-2022-39952 (PARCHA YA!)Fortinet ha publicado actualizaciones de seguridad para abordar 40 vulnerabilidades en su línea de software, incluidos...
Guía de NSA para proteger redes domésticas
Guía de NSA para proteger redes domésticasLa Agencia de Seguridad Nacional de Estados Unidos (NSA) ha publicado una guía para proteger redes domésticas. La guía «Best...
Zero to SIEM in Seconds Part 1: Operationalize in Seconds
Zero to SIEM in Seconds Part 1: Operationalize in SecondsOperationalize in Seconds is the first in a series of blog posts focused on what... The post...
Why Natural Language Processing Is Crucial for Open-Source Intelligence Analysts
Why Natural Language Processing Is Crucial for Open-Source Intelligence AnalystsAs the volume of data continues to grow, it's important to have tools that can help derive...
Addressing Common Executive Compliance Requests
Addressing Common Executive Compliance RequestsThe relationship between executive teams and compliance is a close one, as executives are responsible for ensuring that their organizations adhere to...
Introducing the Inaugural Hacker’s Yearbook
Introducing the Inaugural Hacker’s YearbookGet an overview of the most impactful security trends and cyberattacks of 2022, with key insights to help you prepare for the...
Addressing Common HR Compliance Requests
Addressing Common HR Compliance RequestsPeople & HR departments and organizations must address various compliance requirements to ensure the fair and legal treatment of employees. See some...
USENIX Security ’22 – Alejandro Cabrera Aldaya, Billy Bob Brumley – ‘HyperDegrade: From GHz To MHz Effective CPU Frequencies’
USENIX Security ’22 – Alejandro Cabrera Aldaya, Billy Bob Brumley – ‘HyperDegrade: From GHz To MHz Effective CPU Frequencies’Our thanks to USENIX for publishing their Presenter’s...
The Inaugural Hacker’s Yearbook
The Inaugural Hacker’s YearbookGain a better understanding of the key security trends, cyber breaches, and cyberattacks of 2022 to better prepare for the new challenges of...
“Bizarre” DNS Hacks For Fun And, Um…, Fun
“Bizarre” DNS Hacks For Fun And, Um…, FunI’ve been (slowly) making my way through FOSDEM `23 presentations and caught up to Peter Lowe‘s “Bizarre and Unusual...
Apple fixes zero-day spyware implant bug – patch now!
Apple fixes zero-day spyware implant bug – patch now!Everyone update now! Except for those who don't need to! Or who need to but will only get...
New Sensor Dashboard and Rack PDU Outlet Control
New Sensor Dashboard and Rack PDU Outlet ControlProduct Update: Version 3.11 Our latest product update is a big one! we've introduced a new add-on feature called...
Making the Right Investments to Combat the Cybersecurity Labor Shortage
Making the Right Investments to Combat the Cybersecurity Labor ShortageModernizing PKI can provide the transformative element teams need to stay vigilant and effective throughout the cybersecurity...
Google Patches Chrome’s Fifth Zero-Day of the Year
Google Patches Chrome’s Fifth Zero-Day of the YearAn insufficient validation input flaw, one of 11 patched in an update this week, could allow for arbitrary code...
Fake Reservation Links Prey on Weary Travelers
Fake Reservation Links Prey on Weary TravelersFake travel reservations are exacting more pain from the travel weary, already dealing with the misery of canceled flights and...
iPhone Users Urged to Update to Patch 2 Zero-Days
iPhone Users Urged to Update to Patch 2 Zero-DaysSeparate fixes to macOS and iOS patch respective flaws in the kernel and WebKit that can allow threat...
Twitter Whistleblower Complaint: The TL;DR Version
Twitter Whistleblower Complaint: The TL;DR VersionTwitter is blasted for security and privacy lapses by the company’s former head of security who alleges the social media giant’s...
Firewall Bug Under Active Attack Triggers CISA Warning
Firewall Bug Under Active Attack Triggers CISA WarningCISA is warning that Palo Alto Networks’ PAN-OS is under active attack and needs to be patched ASAP.Read MoreThreatpostCISA...
Ransomware Attacks are on the Rise
Ransomware Attacks are on the RiseLockbit is by far this summer’s most prolific ransomware group, trailed by two offshoots of the Conti group.Read MoreThreatpostLockbit is by...
Cybercriminals Are Selling Access to Chinese Surveillance Cameras
Cybercriminals Are Selling Access to Chinese Surveillance CamerasTens of thousands of cameras have failed to patch a critical, 11-month-old CVE, leaving thousands of organizations exposed.Read MoreThreatpostTens...
Watering Hole Attacks Push ScanBox Keylogger
Watering Hole Attacks Push ScanBox KeyloggerResearchers uncover a watering hole attack likely carried out by APT TA423, which attempts to plant the ScanBox JavaScript-based reconnaissance tool.Read...
Tentacles of ‘0ktapus’ Threat Group Victimize 130 Firms
Tentacles of ‘0ktapus’ Threat Group Victimize 130 FirmsOver 130 companies tangled in sprawling phishing campaign that spoofed a multi-factor authentication system.Read MoreThreatpostOver 130 companies tangled in...
Student Loan Breach Exposes 2.5M Records
Student Loan Breach Exposes 2.5M Records2.5 million people were affected, in a breach that could spell more trouble down the line.Read MoreThreatpost2.5 million people were affected,...
Top 10 Venmo scams: Don’t fall for these common tricks
Top 10 Venmo scams: Don’t fall for these common tricksHere's what to know about some of the most common ploys that scammers use on the payment...
Tech support scammers are still at it: Here’s what to look out for in 2023
Tech support scammers are still at it: Here’s what to look out for in 2023Hello, is it me you’re looking for? Fraudsters still want to help...
Ransomware payments down 40% in 2022 – Week in security with Tony Anscombe
Ransomware payments down 40% in 2022 – Week in security with Tony AnscombeRansomware revenue plunges to $456 million in 2022 as more victims refuse to pay...
Hybrid play: Leveling the playing field in online video gaming and beyond
Hybrid play: Leveling the playing field in online video gaming and beyondDoes VALORANT’s approach to cheating signal a turning point in how we deal with the...















