Top Cyber Security Companies in DelhiIntroduction Strong cyber security measures are now essential given the speed at which businesses are going digital and the rise in...
Day: March 3, 2023
Cybersecurity Insights with Contrast CISO David Lindner | 3/3
Cybersecurity Insights with Contrast CISO David Lindner | 3/3 Insight #1 " June 11th, 2023 is getting closer. Have you started pulling together information for the...
Wading Back Into the Software Liability Cesspool
Wading Back Into the Software Liability Cesspool Time must be a flat circle—it seems that every couple of years, someone brings up the topic of software...
Known Vulnerabilities Drove Most Cyberattacks in 2022
Known Vulnerabilities Drove Most Cyberattacks in 2022 New research revealed an all-too-familiar theme: Known vulnerabilities for which patches have been issued were the main way threat...
Being with the “best of the best” as a YC Top Company
Being with the “best of the best” as a YC Top CompanySalt has long benefited from the unique support that comes from being part of the...
Organizations Struggle With CCPA, CPRA, GDPR Compliance
Organizations Struggle With CCPA, CPRA, GDPR Compliance The vast majority—92% of companies across all verticals, states and business sizes—are still unprepared for compliance with the California Consumer...
National Cybersecurity Strategy & Commercial Software Security
National Cybersecurity Strategy & Commercial Software SecurityNational Cybersecurity Strategy & Commercial Software Security ltabo Fri, 03/03/2023 - 14:59 A Bold Step Forward to Incentivize Software...
The ‘TLDR’ of the White House’s New Cyber Strategy: Collective Defense
The ‘TLDR’ of the White House’s New Cyber Strategy: Collective Defense If we could use just two words to summarize the National Cybersecurity Strategy published by...
Death By Social Media: Are TikTok and WeChat Easy Marks for Attackers?
Death By Social Media: Are TikTok and WeChat Easy Marks for Attackers? Most corporations understand the crucial need for efficient access management systems to protect the...
Microsoft FAIL: ‘BlackLotus’ Bootkit Breaks Secure Boot
Microsoft FAIL: ‘BlackLotus’ Bootkit Breaks Secure Boot The BlackLotus malware targets UEFI Secure Boot. For a mere $5000, you too can own it. The post Microsoft FAIL:...
5 top threats from 2022 most likely to strike in 2023
5 top threats from 2022 most likely to strike in 2023The threat landscape is highly diverse and attacks range in sophistication from the most basic scams...
Experts Warn of “SMS Pumping” Fraud Epidemic
Experts Warn of "SMS Pumping" Fraud EpidemicSmall businesses are particularly vulnerableRead MoreSmall businesses are particularly vulnerable
At Least 30% of “Cyber-Criminals” Are Women: Report
At Least 30% of "Cyber-Criminals" Are Women: ReportNew study uses AI to analyze text of dark web forum usersRead MoreNew study uses AI to analyze text...
NCSC: Twitter Users Should Find MFA Alternatives
NCSC: Twitter Users Should Find MFA AlternativesUK's security agency warns against letting protection lapseRead MoreUK's security agency warns against letting protection lapse
CISA Warns Against Royal Ransomware in New Advisory
CISA Warns Against Royal Ransomware in New AdvisoryMalicious activity using a particular malware variant has been spotted since September 2022Read MoreMalicious activity using a particular malware...
New Backdoor MQsTTang Attributed to Mustang Panda Group
New Backdoor MQsTTang Attributed to Mustang Panda GroupUnlike the group’s usual tactics, MQsTTang only has a single stage and does not use obfuscationRead MoreUnlike the group’s...
Retailer WH Smith discloses data breach after a cyberattack
Retailer WH Smith discloses data breach after a cyberattackRetailer WH Smith disclosed a data breach following a cyber attack, threat actors had access to access company...
The U.S. CISA and FBI warn of Royal ransomware operation
The U.S. CISA and FBI warn of Royal ransomware operationThe U.S. Cybersecurity and Infrastructure Security Agency (CISA) is warning of the capabilities of the recently emerged...
Trusted Platform Module (TPM) 2.0 flaws could impact billions of devices
Trusted Platform Module (TPM) 2.0 flaws could impact billions of devicesTwo vulnerabilities affecting the Trusted Platform Module (TPM) 2.0 library could potentially lead to information disclosure...
MQsTTang, a new backdoor used by Mustang Panda APT against European entities
MQsTTang, a new backdoor used by Mustang Panda APT against European entitiesChina-Linked Mustang Panda APT employed MQsTTang backdoor as part of an ongoing campaign targeting European entities....
Weekly Update 337
Weekly Update 337Guns! You know, the things you kinda want to keep pretty well protected and out of the hands of nefarious parties, like the kinds...
Cyberattack on British Retailer WH Smith Exposes Employees` Data
Cyberattack on British Retailer WH Smith Exposes Employees` DataThreat actors breached WH Smith, the 1,700 locations UK retailer, and exposed data belonging to current and former...
Chinese Hackers Are Using a New Backdoor to Deploy Malware
Chinese Hackers Are Using a New Backdoor to Deploy MalwareThis year, the Chinese cyberespionage group Mustang Panda began deploying a new custom backdoor named ‘MQsTTang’ in...
How Royal Ransomware Could Wreak Havoc on the U.S. Digital Economy
How Royal Ransomware Could Wreak Havoc on the U.S. Digital EconomyEarlier this year, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) released an advisory regarding the...
Scanning Attack: What It Is and How to Protect Your Organization Against It?
Scanning Attack: What It Is and How to Protect Your Organization Against It?A scanning attack is a method used by threat actors to identify vulnerabilities in...
Nick Weaver on Regulating Cryptocurrency
Nick Weaver on Regulating CryptocurrencyNicholas Weaver wrote an excellent paper on the problems of cryptocurrencies and the need to regulate the space—with all existing regulations. His...
Play ransomware claims disruptive attack on City of Oakland
Play ransomware claims disruptive attack on City of OaklandThe Play ransomware gang has taken responsibility for a cyberattack on the City of Oakland that has disrupted...
FBI and CISA warn of increasing Royal ransomware attack risks
FBI and CISA warn of increasing Royal ransomware attack risksCISA and the FBI have issued a joint advisory highlighting the increasing threat behind ongoing Royal ransomware...
Brave Search launches AI-powered summarizer in search results
Brave Search launches AI-powered summarizer in search resultsBrave Search has incorporated a new AI-powered tool named Summarizer, which gives a summarized answer to an inputted question...
White House cyber security strategy shifts burden to providers
White House cyber security strategy shifts burden to providersEXECUTIVE SUMMARY: On Thursday, the White House released an ambitious and wide-ranging cyber security plan that calls for...