GitHub makes 2FA mandatory next week for active developersGitHub will start requiring active developers to enable two-factor authentication (2FA) on their accounts beginning next week, on...
Month: March 2023
AT&T alerts 9 million customers of data breach after vendor hack
AT&T alerts 9 million customers of data breach after vendor hackAT&T is notifying roughly 9 million customers that some of their information has been exposed after...
SonicWall devices infected by malware that survives firmware upgrades
SonicWall devices infected by malware that survives firmware upgradesA suspected Chinese hacking campaign has been targeting unpatched SonicWall Secure Mobile Access (SMA) appliances to install custom...
Empowering women in cyber security: A CEO’s perspectives
Empowering women in cyber security: A CEO’s perspectivesMeet the founder and CEO of ReynCon, Connie Matthews Reynolds. With more than two decades of experience in the...
APAC | Fireside Chat | Stopping the Threats That Get Through Your Defences
APAC | Fireside Chat | Stopping the Threats That Get Through Your DefencesPost ContentRead MoreDataBreachToday.com RSS Syndication
Cryptohack Roundup: Tender.fi, Algodex
Cryptohack Roundup: Tender.fi, AlgodexAlso: Uranium Finance Hacker Moves Funds; BitKeep Moves to Refund VictimsEvery week, ISMG rounds up cybersecurity incidents in the world of digital assets....
CorePlague: vulnerabilidades graves en Jenkins
CorePlague: vulnerabilidades graves en JenkinsSe han revelado un par de vulnerabilidades de seguridad graves en el servidor de automatización de código abierto de Jenkins […]Read MoreBlog...
Critical Flaw in Cisco IP Phone Series Exposes Users to Command Injection Attack
Critical Flaw in Cisco IP Phone Series Exposes Users to Command Injection AttackCisco on Wednesday rolled out security updates to address a critical flaw impacting its IP Phone...
SysUpdate Malware Strikes Again with Linux Version and New Evasion Tactics
SysUpdate Malware Strikes Again with Linux Version and New Evasion TacticsThe threat actor known as Lucky Mouse has developed a Linux version of a malware toolkit called SysUpdate,...
Experts Identify Fully-Featured Info Stealer and Trojan in Python Package on PyPI
Experts Identify Fully-Featured Info Stealer and Trojan in Python Package on PyPIA malicious Python package uploaded to the Python Package Index (PyPI) has been found to...
2023 Browser Security Report Uncovers Major Browsing Risks and Blind Spots
2023 Browser Security Report Uncovers Major Browsing Risks and Blind SpotsAs a primary working interface, the browser plays a significant role in today's corporate environment. The...
New Cryptojacking Campaign Leverages Misconfigured Redis Database Servers
New Cryptojacking Campaign Leverages Misconfigured Redis Database ServersMisconfigured Redis database servers are the target of a novel cryptojacking campaign that leverages a legitimate and open source...
Hackers Exploit Containerized Environments to Steal Proprietary Data and Software
Hackers Exploit Containerized Environments to Steal Proprietary Data and SoftwareA sophisticated attack campaign dubbed SCARLETEEL is targeting containerized environments to perpetrate theft of proprietary data and software. "The...
Chinese Hackers Targeting European Entities with New MQsTTang Backdoor
Chinese Hackers Targeting European Entities with New MQsTTang BackdoorThe China-aligned Mustang Panda actor has been observed using a hitherto unseen custom backdoor called MQsTTang as part of an...
New Flaws in TPM 2.0 Library Pose Threat to Billions of IoT and Enterprise Devices
New Flaws in TPM 2.0 Library Pose Threat to Billions of IoT and Enterprise DevicesA pair of serious security defects has been disclosed in the Trusted...
HPE Acquires Axis Security to Gain SSE Platform
HPE Acquires Axis Security to Gain SSE Platform Hewlett-Packard Enterprise (HPE) has announced its intent to acquire Axis Security, a provider of a secure service edge...
Addressing TSA’s Aviation Security Emergency Mandates for Airlines and Airports
Addressing TSA’s Aviation Security Emergency Mandates for Airlines and AirportsThe Department of Homeland Security (DHS) and its Transportation Security Administration (TSA) have issued a handful of...
Why software transparency is critical: Understanding supply chain security in a software-driven society
Why software transparency is critical: Understanding supply chain security in a software-driven society By now the topic of software supply chain security is clearly among the...
USENIX Security ’22 – Chaoshun Zuo, Zhiqiang Lin – ‘Playing Without Paying: Detecting Vulnerable Payment Verification in Native Binaries of Unity Mobile Games’
USENIX Security ’22 – Chaoshun Zuo, Zhiqiang Lin – ‘Playing Without Paying: Detecting Vulnerable Payment Verification in Native Binaries of Unity Mobile Games’Our thanks to USENIX...
Managing Cloud Compliance and Security Posture
Managing Cloud Compliance and Security PostureWhy compliance and access security in the public cloud are so challenging – and how carefully chosen CSPM tools can help...
Palo Alto Networks Adds Identity Module to Integrated SOC Platform
Palo Alto Networks Adds Identity Module to Integrated SOC Platform Palo Alto Networks this week revealed it added a threat detection and response module to its...
International Women’s Day: Recognizing Contributions of RiskLens Women
International Women’s Day: Recognizing Contributions of RiskLens Women The theme of this year’s International Women’s Day is #EmbraceEquity “to get the world talking about why equal...
“Team Jorge” Exposed for Disinformation Campaigns Targeting Presidential Elections
“Team Jorge” Exposed for Disinformation Campaigns Targeting Presidential ElectionsThere’s an interesting detail in the reports trying to expose “Team Jorge“. An investigation by 30 media outlets,...
US National Cybersecurity Strategy: What It Means for Digital Identity
US National Cybersecurity Strategy: What It Means for Digital IdentityThe Biden-Harris Administration recently released its National Cybersecurity Strategy outlining how it will address rapidly evolving cyberthreats...
Rise in “Ghost” Tankers Delivering Russian Oil to Asia
Rise in “Ghost” Tankers Delivering Russian Oil to AsiaSomeone is buying up old decrepit tankers, turning off any tracking electronics, and pushing huge amounts of Russian...
Cybersecurity in wartime: how Ukraine’s infosec community is coping
Cybersecurity in wartime: how Ukraine's infosec community is copingWhenever shells rain down on Ukraine, Yuriy Gatupov's colleagues put a '+' sign in a chat room. Then,...
Economic pressures are increasing cybersecurity risks; a recession would amp them up more
Economic pressures are increasing cybersecurity risks; a recession would amp them up morePredictions on whether or when the global economy will fall into a recession continue...
How to de-risk your digital ecosystem
How to de-risk your digital ecosystemCompanies rightly see much promise for future revenues and productivity by building and participating in emerging digital ecosystems — but most...
Well-funded security systems fail to prevent cyberattacks in US and Europe: Report
Well-funded security systems fail to prevent cyberattacks in US and Europe: ReportMultilayered, well-funded cybersecurity systems are unable to protect enterprises in the US and Europe from...
Malicious package flood on PyPI might be sign of new attacks to come
Malicious package flood on PyPI might be sign of new attacks to comeOver the weekend an attacker has been uploading thousands of malicious Python packages on...




























