Attacker floods PyPI with 450+ malicious packages that drop Windows trojan via Dropbox Sonatype has been tracking an open source malware campaign developing over the weekend...
Month: February 2023
Tesla Racing Instructor Warns Sudden Acceleration A Design Flaw: NOT Driver Fault
Tesla Racing Instructor Warns Sudden Acceleration A Design Flaw: NOT Driver FaultAs I suggested a couple weeks ago, Tesla sudden acceleration has hallmarks of 1980s design...
Twitter’s Paywall 2FA, Mental Health Data for Sale, Meta’s Verified Program
Twitter’s Paywall 2FA, Mental Health Data for Sale, Meta’s Verified ProgramTwitter is phasing out its free text message two-factor authentication (2FA) and putting the feature behind...
The cloud’s worst kept secret? Vulnerabilities
The cloud’s worst kept secret? VulnerabilitiesGraham Cluley Security News is sponsored this week by the folks at Sysdig. Thanks to the great team there for their...
When Low-Tech Hacks Cause High-Impact Breaches
When Low-Tech Hacks Cause High-Impact BreachesWeb hosting giant GoDaddy made headlines this month when it disclosed that a multi-year breach allowed intruders to steal company source...
Microsoft is bringing “Paste as plain text” to Windows apps with PowerToys
Microsoft is bringing "Paste as plain text" to Windows apps with PowerToysMicrosoft's open-source PowerToys tool is a great way to customize your Windows experience. It comes with...
Australia news live: Optus and Medibank hacks exposed cybersecurity ‘gaps’, says paper calling for wider government powers
Australia news live: Optus and Medibank hacks exposed cybersecurity ‘gaps’, says paper calling for wider government powersPM addresses need for new national strategy at Sydney roundtable....
How to prepare for initial FedRAMP ATO kickoff and Agency briefing?
How to prepare for initial FedRAMP ATO kickoff and Agency briefing?Federal and Defense Agencies are increasingly buying commercial cloud services to meet their mission requirements. Commercial...
Implementing Data Diode Pattern on AWS for Data Loss Prevention (DLP) and Zero Trust Access Control
Implementing Data Diode Pattern on AWS for Data Loss Prevention (DLP) and Zero Trust Access ControlAuthor: Matt Venne, Solutions Director, stackArmor, Inc. One of the biggest...
One Year Later: Cyber Battles Still Rage in Ukraine
One Year Later: Cyber Battles Still Rage in UkraineThis past week was dominated with stories surrounding the one-year mark of Russia’s invasion into Ukraine. What have...
USENIX Security ’22 – Kevin Burk, Fabio Pagani, Christopher Kruegel, Giovanni Vigna – ‘Decomperson: How Humans Decompile And What We Can Learn From It’
USENIX Security ’22 – Kevin Burk, Fabio Pagani, Christopher Kruegel, Giovanni Vigna – ‘Decomperson: How Humans Decompile And What We Can Learn From It’Our thanks to...
The Third Line of Defense: Auditors Must Embrace Compliance Technology in a Changing World
The Third Line of Defense: Auditors Must Embrace Compliance Technology in a Changing World In recent years, the Compliance burden has increased, and organizations that breach...
ChromeLoader campaign lures with malicious VHDs for popular games
ChromeLoader campaign lures with malicious VHDs for popular gamesSecurity researchers have noticed that the operators of the ChromeLoader browser hijacking and adware campaign are now using VHD files named...
Microsoft Edge’s built-in VPN support is around the corner
Microsoft Edge's built-in VPN support is around the cornerMicrosoft Edge's built-in VPN functionality could soon begin rolling out to users in the stable channel. Edge's VPN...
Who’s Behind the Botnet-Based Service BHProxies?
Who’s Behind the Botnet-Based Service BHProxies?A security firm has discovered that a five-year-old crafty botnet known as Mylobot appears to be powering a residential proxy service...
From CVE-2022-33679 to Unauthenticated Kerberoasting
From CVE-2022-33679 to Unauthenticated KerberoastingOn September 13, 2022, a new Kerberos vulnerability was published on the Microsoft Security Response Center’s security site. It’s labeled as a...
Increasing Evidence Tesla Drivers Burn to Death While Unable to Open Any Door
Increasing Evidence Tesla Drivers Burn to Death While Unable to Open Any DoorI’ve noticed a string of Tesla reports saying basically the same thing. Drivers who...
New Threat Report Shows Attackers Increasingly Exploiting MFA Fatigue
New Threat Report Shows Attackers Increasingly Exploiting MFA FatigueBy Ben Brigida, Director, Security Operations, Expel If you want to know what’s happening in the cybersecurity world,...
The Future of Online Privacy
The Future of Online PrivacyBy Mia Naumoska, Chief Marketing Officer at Internxt You’ve probably noticed that there’s a lot of bad news about online privacy these...
AI-powered phishing: Chatbot hazard or hot air?
AI-powered phishing: Chatbot hazard or hot air?Post ContentRead MoreProofpoint News Feed
Russia-Ukraine War: Cybersecurity Lessons for Tech Pros
Russia-Ukraine War: Cybersecurity Lessons for Tech ProsPost ContentRead MoreProofpoint News Feed
EU Orders Staff to Remove TikTok from Phones, Devices
EU Orders Staff to Remove TikTok from Phones, DevicesDecision Affecting 32,000 Employees Aimed at 'Cyber Threats and Incidents'The European Commission has directed employees to remove the...
USENIX Security ’22 – ‘Characterizing The Security Of Github CI Workflows’
USENIX Security ’22 – ‘Characterizing The Security Of Github CI Workflows’Complete Title: 'USENIX Security '22 - Igibek Koishybayev, Aleksandr Nahapetyan, Raima Zachariah, Siddharth Muralee, Bradley Reaves,...
Dish Network goes offline after likely cyberattack, employees cut off
Dish Network goes offline after likely cyberattack, employees cut offAmerican TV giant and satellite broadcast provider, Dish Network has mysteriously gone offline with its websites and...
PureCrypter malware hits govt orgs with ransomware, info-stealers
PureCrypter malware hits govt orgs with ransomware, info-stealersA threat actor has been targeting government entities with PureCrypter malware downloader that has been seen delivering multiple information stealers...
Cisco to Buy Startup Valtix to Guard Workloads Across Clouds
Cisco to Buy Startup Valtix to Guard Workloads Across CloudsValtix Purchase Will Help Clients Enforce Policies Across Public Cloud EnvironmentsCisco plans to buy cloud security startup...
Innovation at the Expense of Cybersecurity? No More!
Innovation at the Expense of Cybersecurity? No More! Earlier this month, Jen Easterly and Eric Goldstein of the Cybersecurity and Infrastructure Security Agency (CISA) at the...
Code42 Instructor™ Leverages Teams to Send Micro-Trainings
Code42 Instructor™ Leverages Teams to Send Micro-TrainingsEmployees put files at risk every day – whether intentionally or unintentionally. While some of this risky activity is accidental,...
Automated severity scoring comes to the GitGuardian secrets detection platform!
Automated severity scoring comes to the GitGuardian secrets detection platform!This new feature automates assigning severity levels to each incident, allowing security teams to quickly identify the...
USENIX Security ’22 – Sheng Yu, Yu Qu, Xunchao Hu, Heng Yin – ‘DeepDi: Learning A Relational Graph Convolutional Network Model On Instructions For Fast And Accurate Disassembly’
USENIX Security ’22 – Sheng Yu, Yu Qu, Xunchao Hu, Heng Yin – ‘DeepDi: Learning A Relational Graph Convolutional Network Model On Instructions For Fast And...


