Using AI Cybersecurity Solutions to Stop Ransomware Growing interconnectedness makes it harder to detect ransomware before it causes harm. Whether data is processed locally or in...
Month: March 2023
Netography Detection Model Release – March 13, 2023
Netography Detection Model Release – March 13, 2023The Netography Threat Research Team has released its latest detection model updates, including several optimizations of existing detections to...
Wicked Good Development Episode 29: White House Unveils New National Cybersecurity Strategy
Wicked Good Development Episode 29: White House Unveils New National Cybersecurity Strategy The post Wicked Good Development Episode 29: White House Unveils New National Cybersecurity Strategy appeared...
USENIX Security ’22 – Jinsheng Ba, Marcel Böhme, Zahra Mirzamomen, Abhik Roychoudhury – ‘Stateful Greybox Fuzzing’
USENIX Security ’22 – Jinsheng Ba, Marcel Böhme, Zahra Mirzamomen, Abhik Roychoudhury – ‘Stateful Greybox Fuzzing’Our thanks to USENIX for publishing their Presenter’s outstanding USENIX Security...
The Top 5 Brand Protection Software Solutions in 2023
The Top 5 Brand Protection Software Solutions in 2023Which service providers offer the best brand protection solutions for your business? We have composed a list of...
Cybersecurity Learning Across Sectors – How ICCWS Brings Academics, Government, And Private Companies Together
Cybersecurity Learning Across Sectors – How ICCWS Brings Academics, Government, And Private Companies TogetherThe 18th International Conference on Cyber Warfare and Security gave researchers, policymakers, and...
Fairwinds Insights Basics Tutorial: Avoid Containers Running with Dangerous Capabilities
Fairwinds Insights Basics Tutorial: Avoid Containers Running with Dangerous Capabilities Containers are standard units of software that package code and its related dependencies to enable applications...
What to Expect During a SOX Compliance Audit
What to Expect During a SOX Compliance Audit In 2002, the Public Company Accounting Oversight Board (PCAOB) created the Sarbanes-Oxley Act (SOX) due to major corporate...
Randall Munroe’s XKCD ‘Radians Are Cursed’
Randall Munroe’s XKCD ‘Radians Are Cursed’ via the comic artistry and dry wit of Randall Munroe, resident at XKCD! Permalink The post Randall Munroe’s XKCD ‘Radians...
IBM partners up with Cohesity for better data defense in new storage suite
IBM partners up with Cohesity for better data defense in new storage suiteData security and protection are the main upside for IBM’s upcoming storage offering, which...
Can a quantum algorithm crack RSA cryptography? Not yet
Can a quantum algorithm crack RSA cryptography? Not yetEvery CISO has encryption implementation decisions to make at a variety of levels and instances as they sort...
Amazon-owned Ring reportedly suffers ransomware attack
Amazon-owned Ring reportedly suffers ransomware attackRing, a home security and smart home company owned by Amazon, has reportedly suffered a ransomware attack by Russia-linked ALPHV group, according...
ReversingLabs adds new context-based secret detection capabilities
ReversingLabs adds new context-based secret detection capabilitiesReversingLabs has added new secret detection capabilities to its software supply chain security (SSCS) tool to help developers prioritize remediation...
Universities and colleges cope silently with ransomware attacks
Universities and colleges cope silently with ransomware attacksAlthough some cybersecurity researchers say that ransomware attacks are on the downswing as cybercriminals face declining payments, a spate...
MI5 Launches New Agency to Tackle State-Backed Attacks
MI5 Launches New Agency to Tackle State-Backed AttacksNational Protective Security Authority begins its workRead MoreNational Protective Security Authority begins its work
UK Crypto Firm Loses $200m in Cyber-Attack
UK Crypto Firm Loses $200m in Cyber-AttackEuler Finance suffered "flash loan" attackRead MoreEuler Finance suffered "flash loan" attack
LA Housing Authority Suffers Year-Long Breach
LA Housing Authority Suffers Year-Long BreachLockBit ransomware group stole data and encrypted filesRead MoreLockBit ransomware group stole data and encrypted files
CISA Creates New Ransomware Vulnerability Warning Program
CISA Creates New Ransomware Vulnerability Warning ProgramThe Agency will warn critical infrastructure entities to enable mitigation before an incidentRead MoreThe Agency will warn critical infrastructure entities...
DEV-1101 Updates Open Source Phishing Kit
DEV-1101 Updates Open Source Phishing KitThe kit is written in NodeJS and has automated setup and detection evasion capabilitiesRead MoreThe kit is written in NodeJS and...
YoroTrooper Espionage Campaigns Target CIS, EU Countries
YoroTrooper Espionage Campaigns Target CIS, EU CountriesThe threat actors mainly targeted organizations across Azerbaijan, Tajikistan and KyrgyzstanRead MoreThe threat actors mainly targeted organizations across Azerbaijan, Tajikistan...
Dissecting the malicious arsenal of the Makop ransomware gang
Dissecting the malicious arsenal of the Makop ransomware gangCyber security researcher Luca Mella analyzed the Makop ransomware employed in a recent intrusion. Executive summary Insights from...
Advanced actor targets Fortinet FortiOS in attacks on govt entities
Advanced actor targets Fortinet FortiOS in attacks on govt entitiesAn unknown threat actor is targeting Government entities and large organizations by exploiting a security flaw in...
DEV-1101 AiTM phishing kit is fueling large-scale phishing campaigns
DEV-1101 AiTM phishing kit is fueling large-scale phishing campaignsMicrosoft warns of large-scale phishing attacks orchestrated with an open-source adversary-in-the-middle (AiTM) phishing kit available in the cybercrime...
$197 Million in Cryptocurrency Stolen in Euler Finance Attack
$197 Million in Cryptocurrency Stolen in Euler Finance AttackOn Sunday, a cryptocurrency flash loan attack on the lending platform Euler Finance resulted in the theft of...
What Is Cyber Essentials and How Can Heimdal Help Your Organization Achieve CE Compliance?
What Is Cyber Essentials and How Can Heimdal Help Your Organization Achieve CE Compliance?Cyber Essentials is a practical, government-backed scheme that will assist you in protecting...
FBI’s Report Shows: Investment Fraud Caused Loses of Over $3 Billion in 2022
FBI’s Report Shows: Investment Fraud Caused Loses of Over $3 Billion in 2022According to the FBI’s annual Internet Crime Report, investment fraud was the most common...
KamikakaBot Malware Used to Attack Southeast Asian Government Agencies
KamikakaBot Malware Used to Attack Southeast Asian Government AgenciesThe Dark Pink APT has been linked to a new wave of attacks using the KamiKakaBot malware against...
Patch Tuesday March 2023 – Microsoft Releases Fixes for 23 Vulnerabilities
Patch Tuesday March 2023 – Microsoft Releases Fixes for 23 VulnerabilitiesAs part of the March vulnerability patching bout, Microsoft has released 23 fixes for Chromium- and...
BlackLotus UEFI Bootkit Detection: Exploits CVE-2022-21894 to Bypass UEFI Secure Boot and Disables OS Security Mechanisms
BlackLotus UEFI Bootkit Detection: Exploits CVE-2022-21894 to Bypass UEFI Secure Boot and Disables OS Security Mechanisms An increasing number of Unified Extensible Firmware Interface (UEFI) security...
FBI reveals that more money is lost to investment fraud than ransomware and business email compromise combined
FBI reveals that more money is lost to investment fraud than ransomware and business email compromise combinedThe latest annual FBI report on the state of cybercrime...





























