USENIX Security ’22 – Chaoshun Zuo, Zhiqiang Lin – ‘Playing Without Paying: Detecting Vulnerable Payment Verification in Native Binaries of Unity Mobile Games’Our thanks to USENIX...
Day: March 9, 2023
Managing Cloud Compliance and Security Posture
Managing Cloud Compliance and Security PostureWhy compliance and access security in the public cloud are so challenging – and how carefully chosen CSPM tools can help...
Palo Alto Networks Adds Identity Module to Integrated SOC Platform
Palo Alto Networks Adds Identity Module to Integrated SOC Platform Palo Alto Networks this week revealed it added a threat detection and response module to its...
International Women’s Day: Recognizing Contributions of RiskLens Women
International Women’s Day: Recognizing Contributions of RiskLens Women The theme of this year’s International Women’s Day is #EmbraceEquity “to get the world talking about why equal...
“Team Jorge” Exposed for Disinformation Campaigns Targeting Presidential Elections
“Team Jorge” Exposed for Disinformation Campaigns Targeting Presidential ElectionsThere’s an interesting detail in the reports trying to expose “Team Jorge“. An investigation by 30 media outlets,...
US National Cybersecurity Strategy: What It Means for Digital Identity
US National Cybersecurity Strategy: What It Means for Digital IdentityThe Biden-Harris Administration recently released its National Cybersecurity Strategy outlining how it will address rapidly evolving cyberthreats...
Rise in “Ghost” Tankers Delivering Russian Oil to Asia
Rise in “Ghost” Tankers Delivering Russian Oil to AsiaSomeone is buying up old decrepit tankers, turning off any tracking electronics, and pushing huge amounts of Russian...
Aussie tech worker payroll scheme operators found guilty of tax fraud
Aussie tech worker payroll scheme operators found guilty of tax fraudContractors left hanging while principals splurged on luxury goods Three of the principals of an Australian...
Dems, Repubs eye up ban on chat apps they don’t like
Dems, Repubs eye up ban on chat apps they don't likeClock is ticking for TikTok and other foreign natter-ware On Tuesday a bipartisan group of a...
Suspected Chinese cyber spies target unpatched SonicWall devices
Suspected Chinese cyber spies target unpatched SonicWall devicesThey've been lurking in networks since at least 2021 Suspected Chinese cyber criminals have zeroed in on unpatched SonicWall...
Cybersecurity in wartime: how Ukraine’s infosec community is coping
Cybersecurity in wartime: how Ukraine's infosec community is copingWhenever shells rain down on Ukraine, Yuriy Gatupov's colleagues put a '+' sign in a chat room. Then,...
Economic pressures are increasing cybersecurity risks; a recession would amp them up more
Economic pressures are increasing cybersecurity risks; a recession would amp them up morePredictions on whether or when the global economy will fall into a recession continue...
How to de-risk your digital ecosystem
How to de-risk your digital ecosystemCompanies rightly see much promise for future revenues and productivity by building and participating in emerging digital ecosystems — but most...
Well-funded security systems fail to prevent cyberattacks in US and Europe: Report
Well-funded security systems fail to prevent cyberattacks in US and Europe: ReportMultilayered, well-funded cybersecurity systems are unable to protect enterprises in the US and Europe from...
Malicious package flood on PyPI might be sign of new attacks to come
Malicious package flood on PyPI might be sign of new attacks to comeOver the weekend an attacker has been uploading thousands of malicious Python packages on...
Hacked home computer of engineer led to second LastPass data breach
Hacked home computer of engineer led to second LastPass data breachPassword management company LastPass, which was hit by two data breaches last year, has revealed that...
Timeline of the latest LastPass data breaches
Timeline of the latest LastPass data breachesOn November 30, 2022, password manager LastPass informed customers of a cybersecurity incident following unusual activity within a third-party cloud...
How security leaders can effectively manage Gen Z staff
How security leaders can effectively manage Gen Z staffIn 2022, I started a podcast aimed at converting more Gen Z to seek careers in cybersecurity. In...
Top 10 open source software risks for 2023
Top 10 open source software risks for 2023Known vulnerabilities, compromise of legitimate package, and name confusion attacks are expected to be among the top ten open...
BlackLotus bootkit can bypass Windows 11 Secure Boot: ESET
BlackLotus bootkit can bypass Windows 11 Secure Boot: ESETA Unified Extensible Firmware Interface (UEFI) bootkit called BlackLotus is found to be capable of bypassing an essential...
SANS, Google launch academy to promote cloud security, diversity in workforce
SANS, Google launch academy to promote cloud security, diversity in workforceSANS Institute has launched the SANS Cloud Diversity Academy (SCDA) in partnership with Google, to help...
‘A woman from Mars’: Life in the pursuit of space exploration
‘A woman from Mars’: Life in the pursuit of space explorationAn astrobiologist, analog astronaut, author and speaker, Dr. Michaela Musilova shares her experience as a woman...
Veeam warns to install patches to fix a bug in its Backup & Replication product
Veeam warns to install patches to fix a bug in its Backup & Replication productVeeam addressed a high-severity vulnerability in the Backup Service that impacts Backup...
A critical flaw affects Fortinet FortiOS and FortiProxy, patch it now!
A critical flaw affects Fortinet FortiOS and FortiProxy, patch it now!Fortinet addressed a critical heap buffer underflow vulnerability affecting FortiOS and FortiProxy, which can lead to...
Smashing Security podcast #312: Rule 34, Twitter scams, and Facebook fails
Smashing Security podcast #312: Rule 34, Twitter scams, and Facebook failsScammers get pwned by a Canadian granny! Don't be seduced in a bar by an iPhone...
McAfee Teammates Share How They #EmbraceEquity This International Women’s Day
McAfee Teammates Share How They #EmbraceEquity This International Women’s Day International Women’s Day is a time for us to celebrate the achievements and contributions of women...
Thank you and goodbye to the Chrome Cleanup Tool
Thank you and goodbye to the Chrome Cleanup ToolPosted by Jasika Bawa, Chrome Security Team Starting in Chrome 111 we will begin to turn down the...
OSV and the Vulnerability Life Cycle
OSV and the Vulnerability Life CyclePosted by Oliver Chang and Andrew Pollock, Google Open Source Security Team It is an interesting time for everyone concerned with...
Security incident response policy
Security incident response policyThe Security Incident Response Policy, from TechRepublic Premium, describes the organization’s process for minimizing and mitigating the results of an information technology security-related...
Veeam fixes bug that lets hackers breach backup infrastructure
Veeam fixes bug that lets hackers breach backup infrastructureVeeam urged customers to patch a high-severity Backup Service security vulnerability impacting its Backup & Replication software. [...]Read...