GunAuction site was hacked and data of 565k accounts were exposedHackers compromised the website GunAuction.com, a website that allows people to buy and sell guns, and stole...
Month: March 2023
Highlights from the New U.S. Cybersecurity Strategy
Highlights from the New U.S. Cybersecurity StrategyThe Biden administration today issued its vision for beefing up the nation’s collective cybersecurity posture, including calls for legislation establishing...
S4x23 Review Part 1: What’s New in OT Security
S4x23 Review Part 1: What's New in OT SecurityThis blog introduces discussions from S4x23, the ICS security conference in Miami over several posts. The first installment...
1Password is looking to a password-free future. Here’s why
1Password is looking to a password-free future. Here’s whyWith phishing-based credentials theft on the rise, 1Password CPO Steve Won explains why the endgame is to 'eliminate’...
Google Workspace admins can now use client-side encryption on Gmail and Calendar
Google Workspace admins can now use client-side encryption on Gmail and CalendarOrganizations subject to government regulations can gain more control over their own security. The post...
Australian woman arrested for email bombing a government office
Australian woman arrested for email bombing a government officeThe Australian Federal Police arrested a woman in Werrington, Sydney, for allegedly email bombing the office of a...
Hatch Bank discloses data breach after GoAnywhere MFT hack
Hatch Bank discloses data breach after GoAnywhere MFT hackFintech banking platform Hatch Bank has reported a data breach after hackers stole the personal information of almost...
Chinese hackers use new custom backdoor to evade detection
Chinese hackers use new custom backdoor to evade detectionThe Chinese cyber espionage hacking group Mustang Panda was seen deploying a new custom backdoor named 'MQsTTang' in...
Chick-fil-A confirms accounts hacked in months-long “automated” attack
Chick-fil-A confirms accounts hacked in months-long "automated" attackAmerican fast food chain Chick-fil-A has confirmed that customers' accounts were breached in a months-long credential stuffing attack, allowing...
BlackLotus bootkit bypasses UEFI Secure Boot on patched Windows 11
BlackLotus bootkit bypasses UEFI Secure Boot on patched Windows 11The developers of the BlackLotus UEFI bootkit have improved the malware with Secure Boot bypass capabilities that...
Microsoft releases Windows security updates for Intel CPU flaws
Microsoft releases Windows security updates for Intel CPU flawsMicrosoft has released out-of-band security updates for 'Memory Mapped I/O Stale Data (MMIO)' information disclosure vulnerabilities in Intel...
7 likely scenarios: How cyber security will change in 2023
7 likely scenarios: How cyber security will change in 2023 By Isla Sibanda, an ethical hacker and cyber security specialist based out of Pretoria. For over twelve...
Phishing is what type of attack? Definition, trends and best practices
Phishing is what type of attack? Definition, trends and best practicesBy George Mack, Content Marketing Manager, Check Point. Phishing threats have been making waves in the...
Former US CISO on New US Cybersecurity Strategy: ‘It’s Bold’
Former US CISO on New US Cybersecurity Strategy: 'It's Bold'Gen. Gregory Touhill Weighs in on Merits of Product Security by Design and DefaultRetired Air Force Gen....
US Cybersecurity Strategy Shifts Liability Issues to Vendors
US Cybersecurity Strategy Shifts Liability Issues to VendorsHolding Vendors Liable for Insecure Apps Fuels Safe Harbor, Transparency QuestionsA new federal strategy to make commercial manufacturers liable...
Security Firm COO Loses Bid to Dismiss Cyberattack Case
Security Firm COO Loses Bid to Dismiss Cyberattack CaseJudge Rejects Recommendations to Drop Case in Medical Center IncidentA Georgia man who is the chief operating officer...
HPE Buys SSE Firm Axis Security to Obtain Single-Vendor SASE
HPE Buys SSE Firm Axis Security to Obtain Single-Vendor SASEDeal Comes As Pressure Increases on Pure-Play Vendors to Deliver Native SASE StackHewlett Packard Enterprise will soon...
Google Gmail client-side encryption is available globally
Google Gmail client-side encryption is available globallyGmail client-side encryption (CSE) is now available for Workspace Enterprise Plus, Education Plus, and Education Standard customers. Google announced that...
GootLoader and FakeUpdates Malware Campaign Targets Law Firms
GootLoader and FakeUpdates Malware Campaign Targets Law FirmsTwo separate threat campaigns targeted six different law firms in January and February 2023, distributing GootLoader and FakeUpdates, also...
Stay Vigilant: Trezor Reports a Massive Crypto Wallet Phishing Scam
Stay Vigilant: Trezor Reports a Massive Crypto Wallet Phishing ScamA phishing campaign poses as a Trezor data breach notification order to steal a target’s cryptocurrency wallet...
What Is Clone Phishing? Definition, Examples, and Prevention Measures
What Is Clone Phishing? Definition, Examples, and Prevention MeasuresCybercriminals are using phishing attacks to spread malware and other online threats. But as we get smarter and...
WhatsApp, Teams, and Telegram – Banned in Russian Government Organizations
WhatsApp, Teams, and Telegram – Banned in Russian Government OrganizationsStarting March 1st, the Russian law ”On Information, Information Technologies and Information Protection” forbids state organizations to...
Most Popular Ethical Hacking Tools in 2023
Most Popular Ethical Hacking Tools in 2023Last time we talked about what ethical hacking is, what are its key concepts and what are the benefits it...
Can The US-Led Multinational Counterattack Stop Ransomware’s Gold Rush?
Can The US-Led Multinational Counterattack Stop Ransomware’s Gold Rush?By Camellia Chan, CEO & founder of Flexxon I was honored to be one of the representatives from...
Cybersecurity Attacks To Come: Here’s How To Prepare
Cybersecurity Attacks To Come: Here’s How To PrepareBy Russ Reeder, CEO, Netrix Global Ensuring 100% prevention against all cyberattacks is impossible today, as modern perpetrators find...
Detect PlugX Trojan Masquerading as a Legitimate Windows Debugger Tool to Fly Under the Radar
Detect PlugX Trojan Masquerading as a Legitimate Windows Debugger Tool to Fly Under the Radar Old dog, new tricks! Security researchers revealed PlugX remote access Trojan...
Indigo Books & Music refuses to pay ransom after hackers stole employee information
Indigo Books & Music refuses to pay ransom after hackers stole employee informationFollowing what it called a "cybersecurity incident" three weeks ago, Canadian bookstore chain Indigo...
WH Smith investigates hacking attack after employee data stolen
WH Smith investigates hacking attack after employee data stolenBritish high street giant WH Smith has revealed that it has suffered a "cybersecurity incident," which has seen...
Trezor crypto wallets under attack in SMS phishing campaign
Trezor crypto wallets under attack in SMS phishing campaignWillie Sutton, the criminal who became legendary for stealing from banks during a forty year career, was once...
Vice Society publishes data stolen during Vesuvius ransomware attack
Vice Society publishes data stolen during Vesuvius ransomware attackA notorious ransomware gang has claimed responsibility for a cyber attack against Vesuvius, the London Stock Exchange-listed molten...