Source: www.schneier.com – Author: Bruce Schneier HomeBlog Indiana, Iowa, and Tennessee Pass Comprehensive Privacy Laws It’s been a big month for US data privacy. Indiana, Iowa,...
Day: May 24, 2023
SMBs and regional MSPs are increasingly targeted by state-sponsored APT groups – Source: www.csoonline.com
Source: www.csoonline.com – Author: Research shows a shift toward advanced persistent threat actors compromising smaller organization, in part to enable other attacks. Advanced persistent threat (APT)...
New hyperactive phishing campaign uses SuperMailer templates: Report – Source: www.csoonline.com
Source: www.csoonline.com – Author: Network security firm Cofense was able to identify a code trace in phishing emails that revealed SuperMailer abuse in the attacks. Thinkstock...
US sanctions four North Korean entities for global cyberattacks – Source: www.csoonline.com
Source: www.csoonline.com – Author: North Korean hackers stole more virtual currency in 2022 than in any previous year, with estimates ranging from $630 million to over...
CyberArk’s enterprise browser promises zero-trust support, policy management – Source: www.csoonline.com
Source: www.csoonline.com – Author: The identity security vendor is set to launch an enterprise browser in response to increasing post-MFA attacks on session cookies. By Samira...
Credential harvesting tool Legion targets additional cloud services – Source: www.csoonline.com
Source: www.csoonline.com – Author: Threat actors now use Legion to steal AWS-specific credentials from web servers to enable email and SMS spam campaigns. A commercial malware...
Former Uber CSO Joe Sullivan and lessons learned from the infamous 2016 Uber breach – Source: www.csoonline.com
Source: www.csoonline.com – Author: Will Joe Sullivan’s conviction for obstruction in the reporting of the 2016 Uber privacy breach send a chill through the cybersecurity profession?...
C-suite and managers, the disconnect around cyber risk – Source: www.cybertalk.org
Source: www.cybertalk.org – Author: slandau EXECUTIVE SUMMARY: Do you ever feel as though you and your boss have totally different visions for and expected outcomes around...
GUEST ESSAY: A primer on NIST 207A — guidance for adding ZTNA to cloud-native platforms – Source: www.lastwatchdog.com
Source: www.lastwatchdog.com – Author: bacohido By Zack Butcher Zero trust networking architecture (ZTNA) is a way of solving security challenges in a cloud-first world. Related: The...
GUEST ESSAY: A roadmap for wisely tightening cybersecurity in the modern workplace – Source: www.lastwatchdog.com
Source: www.lastwatchdog.com – Author: bacohido By Eric Sugar Hackers can hurt your business or organization in many ways. First and foremost, cyberattacks can lead to data...
Lazarus Group Targeting Microsoft Web Servers to Launch Espionage Malware – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: 1 North Korea threat actor Lazarus group is targeting Windows IIS web servers to launch espionage attacks, according to a new analysis...
US Sanctions North Korean Entities Training Expat IT Workers in Russia, China and Laos – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: 1 Washington has sanctioned four entities and one individual involved in obfuscated revenue generation and malicious cyber activities that support the North...