Look Beyond TikTok: Massive Data Collection Is the Real RiskAll Social Media Apps Collect Information on a Scale That Facilitates SurveillanceThere's much national security ado about...
Day: March 29, 2023
NCA crea e infiltra sitios con servicios DDoS-for-hire falsos
NCA crea e infiltra sitios con servicios DDoS-for-hire falsosLa Agencia Nacional contra el Crimen del Reino Unido (NCA, por sus siglas en inglés) reveló que ha...
Twitter source code leaked via GitHub
Twitter source code leaked via GitHubTwitter issued an DMCA takedown notice to GitHub to get the source code removedRead MoreCategories RSS FeedTwitter issued an DMCA takedown...
UK Sets Up Fake Booter Sites To Muddy DDoS Market
UK Sets Up Fake Booter Sites To Muddy DDoS MarketThe United Kingdom's National Crime Agency (NCA) has been busy setting up phony DDoS-for-hire websites that seek...
Cyral Awarded 3 Gold Cybersecurity Awards for Data Security Excellence
Cyral Awarded 3 Gold Cybersecurity Awards for Data Security ExcellenceToday we are honored and excited to announce that Cyral is the recipient of 3 gold Cybersecurity...
Cyborg Security Achieves SOC 2 Type II Compliance
Cyborg Security Achieves SOC 2 Type II ComplianceDaly City, CA – Friday, March 24, 2023 – Cyborg Security, Inc, a leading provider of threat hunting solutions,...
USENIX Security ’22 – Zenong Zhang, Zach Patterson, Michael Hicks, Shiyi Wei – ‘FIXREVERTER: A Realistic Bug Injection Methodology for Benchmarking Fuzz Testing’
USENIX Security ’22 – Zenong Zhang, Zach Patterson, Michael Hicks, Shiyi Wei – ‘FIXREVERTER: A Realistic Bug Injection Methodology for Benchmarking Fuzz Testing’Our thanks to USENIX...
The Chasm Between Cybersecurity Confidence and Actual Ability
The Chasm Between Cybersecurity Confidence and Actual Ability A survey of 316 cybersecurity training strategy decision-makers in the UK, U.S, Canada, Germany and Sweden published today...
How the Dark Web is Embracing ChatGPT and Generative AI
How the Dark Web is Embracing ChatGPT and Generative AIChatGPT and GPT-4 have been dazzling their users with their linguistic prowess. But, have you ever wondered...
Debating SIEM in 2023, Part 2
Debating SIEM in 2023, Part 2So, we went through “Debating SIEM in 2023, Part 1”, now let’s debate a bit more. At this point, everybody who...
Episode 8
Episode 8Cyborg Security is launching a podcast with a twist! Join us for the first fully interactive threat hunting podcast where you can hang out with...
LogRhythm Expands Partnership with Truvisor to Make Security Easy in Singapore
LogRhythm Expands Partnership with Truvisor to Make Security Easy in SingaporeSINGAPORE – March 29, 2023 — LogRhythm, the company empowering security teams to navigate the ever-changing...
Five Things You Have to Know About Your SPRS Score
Five Things You Have to Know About Your SPRS ScoreIf you’re a defense contractor handling Controlled Unclassified Information (CUI) then you need to know your SPRS...
Google again accused of willfully destroying evidence in Android antitrust battle
Google again accused of willfully destroying evidence in Android antitrust battleStarting to see a pattern here? Judge seems to think so Updated Google Chat histories handed...
Apple patches all the iThings, including iOS 15 hole under attack right now
Apple patches all the iThings, including iOS 15 hole under attack right nowIssue identified in February but owners of older kit weren't warned Happy belated Patch...
China urges Apple to improve security and privacy
China urges Apple to improve security and privacyIt's a juicy market that welcomes foreign investment, National development boss reminds Tim Cook Senior Chinese government officials have...
Hackers changed tactics, went cross-platform in 2022, says Trend Micro
Hackers changed tactics, went cross-platform in 2022, says Trend MicroPayouts from ransomware victims declined by 38% in 2022, prompting hackers to adopt more professional and corporate...
Microsoft announces generative AI Security Copilot
Microsoft announces generative AI Security CopilotMicrosoft today announced its AI Security Copilot, a GPT-4 implementation that brings generative AI capabilities to its in-house security suite, and...
Legacy, password-based authentication systems are failing enterprise security, says study
Legacy, password-based authentication systems are failing enterprise security, says studyAuthentication-related attacks grew in 2022, taking advantage of outdated, password-based authentication systems, according to a study commissioned...
Latitude Data breach is worse than initially estimated. 14 million individuals impacted
Latitude Data breach is worse than initially estimated. 14 million individuals impactedAustralian loan giant Latitude Financial Services (Latitude) revealed that a data breach its has suffered...
Bitter APT group targets China’s nuclear energy sector
Bitter APT group targets China’s nuclear energy sector Intezer researchers reported that a South Asian espionage group, tracked as Bitter, is targeting the Chinese nuclear energy industry....
Toyota Italy accidentally leaked sensitive data
Toyota Italy accidentally leaked sensitive dataToyota Italy accidentally leaked sensitive data for more than one-and-a-half years, until this March, CyberNews reported. A Japanese multinational accidentally leaked...
Eight Tips for CISOs Trying Get Their Board on Board
Eight Tips for CISOs Trying Get Their Board on BoardBy Ori Arbel, CTO, CYREBRO Nobody likes to be misunderstood, least of all C-level executives who play...
Next Generation Cybersecurity for Small to Midsize Businesses
Next Generation Cybersecurity for Small to Midsize BusinessesHow Cynet is giving lean security teams the tools they need to protect their business as budget crunches and...
Protecting Your Parents from Scams with Our New Family Plans
Protecting Your Parents from Scams with Our New Family Plans As people get into their 70s, they stand to lose more to fraud than any other...
ICS/OT Cybersecurity 2022 TXOne Annual Report Insights
ICS/OT Cybersecurity 2022 TXOne Annual Report InsightsThis article gives an in-depth overview of TXOne’s insight report on ICS/OT cyber incidents.Read MoreTrend Micro Research, News, PerspectivesThis article...
Improve your technical knowledge with 13 CompTIA courses for $54.97
Improve your technical knowledge with 13 CompTIA courses for $54.97This deal takes 98% off the total price of this course bundle until 4/3. The post Improve...
With political ‘hacktivism’ on the rise, Google launches Project Shield to fight DDoS attacks
With political ‘hacktivism’ on the rise, Google launches Project Shield to fight DDoS attacksIn 2022, DDoS exploits included high-profile attacks against websites offering information on elections...
Windows 11 KB5023778 update adds promotions to the Start menu
Windows 11 KB5023778 update adds promotions to the Start menuMicrosoft has released the optional March 2023 non-security preview update for Windows 11 that comes with a...
WiFi protocol flaw allows attackers to hijack network traffic
WiFi protocol flaw allows attackers to hijack network trafficCybersecurity researchers have discovered a fundamental security flaw in the design of the IEEE 802.11 WiFi protocol standard,...