Source: grahamcluley.com – Author: Graham Cluley Graham Cluley Security News is sponsored this week by the folks at Expel. Thanks to the great team there for...
Day: May 16, 2023
Why Democracy Is a Critical Asset Against Cyberthreats – Source: www.govinfosecurity.com
Source: www.govinfosecurity.com – Author: 1 Government , Industry Specific , Information Sharing Yigal Unna, Former DG, National Cyber Directorate, Israel, on People and Partnerships Rahul Neel...
Live Webinar Today | Using Machine Learning and Hyperscaled Cloud to Deliver Zero Trust – Source: www.govinfosecurity.com
Source: www.govinfosecurity.com – Author: 1 Jason Georgi Global Field CTO, Prisma SASE, Palo Alto Networks Jason is the Global Field Chief Technology Officer for Prisma SASE...
Efficient Management of Enterprisewide Data Protection – Source: www.govinfosecurity.com
Source: www.govinfosecurity.com – Author: 1 Cloud Access Security Brokers (CASB) , Governance & Risk Management , Next-Generation Technologies & Secure Development Skyhigh Security’s Nate Brady on...
What’s Inside Washington State’s New My Health My Data Act – Source: www.govinfosecurity.com
Source: www.govinfosecurity.com – Author: 1 Organizations of all types have important work ahead to comply with Washington state’s new My Health My Data Act, which pertains...
Bipartisan Bill Aims to Shut Rural Hospital Cyber Skill Gaps – Source: www.govinfosecurity.com
Source: www.govinfosecurity.com – Author: 1 Healthcare , Industry Specific , Legislation & Litigation Calls for CISA to Develop Cyber Workforce Development Strategy Marianne Kolbasuk McGee (HealthInfoSec)...
PharMerica Reports Breach Affecting Nearly 6 Million People – Source: www.govinfosecurity.com
Source: www.govinfosecurity.com – Author: 1 Fraud Management & Cybercrime , Ransomware Money Message Ransomware Group Threatens to Release 1.6 Million Records Mihir Bagwe (MihirBagwe) • May...
What the Uber-Joe Sullivan Case Means for CISO Liability – Source: www.govinfosecurity.com
Source: www.govinfosecurity.com – Author: 1 Leadership & Executive Communication , Training & Security Leadership , Video Attorney Lisa Sotto Advises Security Leaders to Seek Adequate Liability...
The quantum security era is coming – here’s how leaders can prepare for it – Source: www.cybertalk.org
Source: www.cybertalk.org – Author: slandau By Michele Mosca, Chief Executive Officer of evolutionQ and Vikram Sharma, Founder and Chief Executive Officer, QuintessenceLabs. EXECUTIVE SUMMARY: Quantum computers...
RSAC Fireside Chat: How a well-placed ‘NGWAF’ can staunch the flow of web, mobile app attacks – Source: www.lastwatchdog.com
Source: www.lastwatchdog.com – Author: bacohido By Byron V. Acohido Attack surface expansion translates into innumerable wide-open vectors of potential unauthorized access into company networks. Related: The...
Researchers Uncover New “RA Group” Ransomware – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: 1 Threat researchers have discovered another new ransomware actor, this time leveraging Babuk source code in attacks on US and South Korean...
PharMerica Breach Hits Over 5.8 Million Customers – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: 1 Nearly six million customers of a popular nationwide pharmacy services provider have had their personal, health insurance and medical data exposed in...
Qilin’s Dark Web Ransomware Targets Critical Sectors – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: 1 New information has emerged regarding the Qilin ransomware group’s operations and Ransomware-as-a-Service (RaaS) program. In their latest research study, Group-IB’s threat...
The nature of cyberincidents in 2022 – Source: securelist.com
Source: securelist.com – Author: Kaspersky GERT, Kaspersky Security Services SOC, TI and IR posts SOC, TI and IR posts 16 May 2023 minute read Kaspersky offers...
Philadelphia Inquirer operations disrupted after cyberattack – Source: www.bleepingcomputer.com
Source: www.bleepingcomputer.com – Author: Sergiu Gatlan The Philadelphia Inquirer daily newspaper is working on restoring systems impacted by what was described as a cyberattack that hit...
The new info-stealing malware operations to watch out for – Source: www.bleepingcomputer.com
Source: www.bleepingcomputer.com – Author: Bill Toulas The information-stealing malware market is constantly evolving, with multiple malware operations competing for cybercriminal customers by promoting better evasion and...
VirusTotal AI code analysis expands Windows, Linux script support – Source: www.bleepingcomputer.com
Source: www.bleepingcomputer.com – Author: Sergiu Gatlan Google has added support for more scripting languages to VirusTotal Code Insight, a recently introduced artificial intelligence-based code analysis feature....
WhatsApp now lets you lock chats with a password or fingerprint – Source: www.bleepingcomputer.com
Source: www.bleepingcomputer.com – Author: Sergiu Gatlan Meta is now rolling out ‘Chat Lock,’ a new WhatsApp privacy feature allowing users to block others from accessing their...
Ransomware gang steals data of 5.8 million PharMerica patients – Source: www.bleepingcomputer.com
Source: www.bleepingcomputer.com – Author: Bill Toulas Pharmacy services provider PharMerica has disclosed a massive data breach impacting over 5.8 million patients, exposing their medical data to...
Stealthy MerDoor malware uncovered after five years of attacks – Source: www.bleepingcomputer.com
Source: www.bleepingcomputer.com – Author: Bill Toulas A new APT hacking group dubbed Lancefly uses a custom ‘Merdoor’ backdoor malware to target government, aviation, and telecommunication organizations...
Discord Announces a Data Breach Involving a Support Agent – Source: heimdalsecurity.com
Source: heimdalsecurity.com – Author: Andreea Chebac Discord messaging platform announced a data breach. The incident involved a third-party support agent whose account has been compromised. The...
Toyota Disclosed a Ten-Year Long Data Breach – Source: heimdalsecurity.com
Source: heimdalsecurity.com – Author: Andreea Chebac Toyota Motor Corporation issued a notice on the company’s Japanese newsroom disclosing a data breach of ten years. A database...
Third-Party Patch Management: A Comprehensive Guide – Source: heimdalsecurity.com
Source: heimdalsecurity.com – Author: Cristian Neagu In today’s digital age, software vulnerabilities are on the rise, and cyber threats are becoming more sophisticated. As a result,...
Google combats AI misinformation with Search labels, adds dark web security upgrades – Source: www.techrepublic.com
Source: www.techrepublic.com – Author: Megan Crouse Artificial intelligence art service Midjourney and Shutterstock will identify their computer-generated images in Google Search. Image: Adobe Stock/Thaspol Google will...
Israel-based threat actors show growing sophistication of email attacks – Source: www.techrepublic.com
Source: www.techrepublic.com – Author: Karl Greenberg Abnormal Security is tracking cybercriminals from an unusual location for business email compromises who are using sophisticated spoofing to spur...
Survey: Most CISOs feel their business is at risk for cyberattack – Source: www.techrepublic.com
Source: www.techrepublic.com – Author: Cedric Pernet Image: Piscine26/Adobe Stock According to a new survey of 1,600 chief information security officers from around the world by cybersecurity...