Why You Can’t Have True Zero Trust Without API SecurityBy Richard Bird, Chief Security Officer, Traceable Global adoption of Zero Trust security models is soaring and...
Month: March 2023
A Hacker’s Mind News
A Hacker’s Mind NewsMy latest book continues to sell well. Its ranking hovers between 1,500 and 2,000 on Amazon. It’s been spied in airports. Reviews are...
Friday Squid Blogging: Creating Batteries Out of Squid Cells
Friday Squid Blogging: Creating Batteries Out of Squid CellsThis is fascinating: “When a squid ends up chipping what’s called its ring tooth, which is the nail...
Mobile Myths: Can My Apple Devices Get Hacked?
Mobile Myths: Can My Apple Devices Get Hacked? “I bought a Mac, because it’s safer than a PC.” “I always surf the web with my iPhone,...
Spot and Remove Viruses from Your Android Phone
Spot and Remove Viruses from Your Android Phone So, can Android phones get viruses and malware? The answer is yes, and likewise you can do several...
Even after armed with defense tools, CISOs say successful cyberattacks are ‘inevitable’: New study
Even after armed with defense tools, CISOs say successful cyberattacks are ‘inevitable’: New studyCisco’s just-released 2023 Cybersecurity Index shows companies will invest more in security, but...
DevSecOps puts security in the software cycle
DevSecOps puts security in the software cycleAddressing cybersecurity can be a challenge when the focus is on speed in software development and production life cycles. The...
OpenAI: ChatGPT payment data leak caused by open-source bug
OpenAI: ChatGPT payment data leak caused by open-source bugOpenAI says a Redis client open-source library bug was behind Monday's ChatGPT outage and data leak, where users...
Australian police arrest four BEC actors who stole $1.7 million
Australian police arrest four BEC actors who stole $1.7 millionThe Australian Federal Police (AFP) has arrested four members of a cybercriminal syndicate that has laundered $1.7...
Microsoft shares tips on detecting Outlook zero-day exploitation
Microsoft shares tips on detecting Outlook zero-day exploitationMicrosoft today published a detailed guide aiming to help customers discover signs of compromise via exploitation of a recently...
The Week in Ransomware – March 24th 2023 – Clop overload
The Week in Ransomware - March 24th 2023 - Clop overloadThis week's news has been dominated by the Clop ransomware gang extorting companies whose GoAnywhere services...
FBI confirms access to Breached cybercrime forum database
FBI confirms access to Breached cybercrime forum databaseToday, the FBI confirmed they have access to the database of the notorious BreachForums (aka Breached) hacking forum after...
Windows, Ubuntu, and VMWare Workstation hacked on last day of Pwn2Own
Windows, Ubuntu, and VMWare Workstation hacked on last day of Pwn2OwnOn the third day of the Pwn2Own hacking contest, security researchers were awarded $185,000 after demonstrating 5...
Cisco DNA Center Privilege Escalation Vulnerability
Cisco DNA Center Privilege Escalation VulnerabilityA vulnerability in the management API of Cisco DNA Center could allow an authenticated, remote attacker to elevate privileges in the...
Is it worth taking out personal cyber insurance in case you are caught up in a data hack?
Is it worth taking out personal cyber insurance in case you are caught up in a data hack?Experts say investing in identity theft protection may provide...
Password app LastPass hit by cybersecurity breach but says data remains safe
Password app LastPass hit by cybersecurity breach but says data remains safeCompany says its security system prevented the hacker accessing customer data or encrypted passwords Follow...
Medibank hackers announce ‘case closed’ and dump huge data file on dark web
Medibank hackers announce ‘case closed’ and dump huge data file on dark webMedibank confirms it may be the full trove of hundreds of thousands of customers’...
I am a Medibank customer. Am I affected by the cyber-attack? What can I do to protect myself?
I am a Medibank customer. Am I affected by the cyber-attack? What can I do to protect myself?Experts suggest using multifactor authentication and telling your bank...
TPG reveals emails of 15,000 iiNet and Westnet customers exposed in hack
TPG reveals emails of 15,000 iiNet and Westnet customers exposed in hackTelecommunications company says hacker searched for customers’ cryptocurrency and financial information Follow our Australia news...
Telstra sorry for publishing up to 130,000 customers’ details online
Telstra sorry for publishing up to 130,000 customers’ details onlineRelease of names, numbers and addresses of some unlisted customers was not due to cyber-attack Follow our...
Clare O’Neil on national security amid cyber hacks and threats to democracy
Clare O’Neil on national security amid cyber hacks and threats to democracyIn the final episode of Australian Politics for 2022, political editor Katharine Murphy speaks to...
Corelight Pursues IR Partnerships, Smaller Enterprise Deals
Corelight Pursues IR Partnerships, Smaller Enterprise DealsCEO Brian Dye Touts CrowdStrike Partnership, Midsized Enterprises as Key to GrowthCorelight has cemented partnerships with incident response firms and...
Device Maker Zoll Facing 7 Lawsuits in Wake of Breach
Device Maker Zoll Facing 7 Lawsuits in Wake of BreachProposed Class Actions Come in Aftermath of Hacking Incident Affecting More Than 1 MillionMedical device maker Zoll...
US Sends Cyber Team to Aid Albania’s Cyber Defenses
US Sends Cyber Team to Aid Albania's Cyber DefensesMission Helped Find Threats, Vulnerabilities in Albania's Critical InfrastructureThe United States sent its top cyber offensive team to...
How BreachForums’ ‘Pompompurin’ Led the FBI to His Home
How BreachForums' 'Pompompurin' Led the FBI to His HomePolice: Fitzpatrick Waived Right to Silence, Confessed to Starting & Running ForumThe alleged administrator of criminal online forum...
UK parliament follows government by banning TikTok over cybersecurity concerns
UK parliament follows government by banning TikTok over cybersecurity concernsThe commissions of the House of Commons and House of Lords have followed the UK government by...
Critical flaw in AI testing framework MLflow can lead to server and data compromise
Critical flaw in AI testing framework MLflow can lead to server and data compromiseMLflow, an open-source framework that's used by many organizations to manage their machine-learning...
Android-based banking Trojan Nexus now available as malware-as-a-service
Android-based banking Trojan Nexus now available as malware-as-a-serviceItalian cybersecurity firm Cleafy has found “Nexus”, a new Android Trojan capable of hijacking online accounts and siphoning funds...
Security Flaws Cost Fifth of Execs Business
Security Flaws Cost Fifth of Execs BusinessBusiness leaders still underestimate importance of security to growthRead MoreBusiness leaders still underestimate importance of security to growth
UK Parliament Bans TikTok from its Network and Devices
UK Parliament Bans TikTok from its Network and DevicesFurther blow for Chinese social media appRead MoreFurther blow for Chinese social media app



























