New Version of Prometei Botnet Infects Over 10,000 Systems WorldwideAn updated version of a botnet malware called Prometei has infected more than 10,000 systems worldwide since November 2022....
Day: March 11, 2023
S3 Ep125: When security hardware has security holes [Audio + Text]
S3 Ep125: When security hardware has security holes [Audio + Text]Lastest episode - listen now! (Full transcript inside.)Read MoreNaked SecurityLastest episode - listen now! (Full transcript...
SHEIN shopping app goes rogue, grabs price and URL data from your clipboard
SHEIN shopping app goes rogue, grabs price and URL data from your clipboardIt's not exactly data theft, but it's worryingly close to "unintentional treachery" - apparently...
‘Extraordinary, Egregious’ Data Breach at House and Senate
‘Extraordinary, Egregious’ Data Breach at House and Senate Capitol Trouble: Senators, representatives and staffers suffer PII leak. Could it finally kickstart some action? The post ‘Extraordinary, Egregious’...
Vendor Tips for the SIG Questionnaire
Vendor Tips for the SIG Questionnaire Many companies understand the pain of constantly filling out extremely arduous customer- requested security questionnaires. Most of the time, the...
USENIX Security ’22 – Mohammadkazem Taram, Xida Ren, Ashish Venkat, Dean Tullsen – ‘SecSMT: Securing SMT Processors against Contention-Based Covert Channels’
USENIX Security ’22 – Mohammadkazem Taram, Xida Ren, Ashish Venkat, Dean Tullsen – ‘SecSMT: Securing SMT Processors against Contention-Based Covert Channels’Our thanks to USENIX for publishing...
Digital Trust Digest: This Week’s Must-Know News
Digital Trust Digest: This Week’s Must-Know NewsThe Digital Trust Digest is a curated overview of the week’s top cybersecurity news. Here's what happened the week of...
Sick of that Security Questionnaire? Automation is the Answer
Sick of that Security Questionnaire? Automation is the AnswerSecurity questionnaires (SQs) are not fun. They’re time-consuming, tedious work and sometimes, they’re the one thing standing between...
Camelot Launches Cybersecurity Service Augmented by ML
Camelot Launches Cybersecurity Service Augmented by ML Camelot this week launched a Secure360 cybersecurity platform that enables its cybersecurity team to leverage machine learning algorithms to...
Securing Software for Healthy, Energy-Efficient Smart Buildings
Securing Software for Healthy, Energy-Efficient Smart Buildings Jason Christman, Vice President and CPSO of Johnson Controls, Inc., talks about the value of shifting left in design...
SAST Tools Must Support Your Embedded Operating Systems, Toolchains & Compilers – Chose Wisely
SAST Tools Must Support Your Embedded Operating Systems, Toolchains & Compilers – Chose Wisely Embedded software development is very close to the development platform used. Whether...
Reducing Risks and Threats with Continuous SaaS Compliance
Reducing Risks and Threats with Continuous SaaS ComplianceCISOs and GRC officers are quickly recognizing the growing threats posed by misconfigured SaaS applications and integrations between SaaS...