Source: www.darkreading.com – Author: 1 SAN FRANCISCO, June 12, 2023 – Okta, Inc. (NASDAQ: OKTA), the leading independent identity partner, today announced the release of its international Secure Sign-In...
Day: June 12, 2023
RomCom Threat Actor Targets Ukrainian Politicians, US Healthcare – Source: www.darkreading.com
Source: www.darkreading.com – Author: Nathan Eddy, Contributing Writer, Dark Reading The threat actor known as RomCom has returned to the scene, targeting Ukrainian politicians and a...
10 Important Security Tasks You Shouldn’t Skip – Source: www.darkreading.com
Source: www.darkreading.com – Author: Joshua Goldfarb, Security and Fraud Architect, F5 Most of us have benefited from the mistakes of others. While this may sound like...
‘Stealth Soldier’ Attacks Target Libyan Government Entities With Surveillance Malware – Source: www.darkreading.com
Source: www.darkreading.com – Author: Dan Raywood, Senior Editor, Dark Reading A wave of advanced persistent threat (APT) attacks aimed at Libyans has been detected, using malware that...
Supply Chain Attack Defense Demands Mature Threat Hunting – Source: www.darkreading.com
Source: www.darkreading.com – Author: Becky Bracken, Editor, Dark Reading The headlines have become a steady occurrence … Kaseya, SolarWinds, 3CX, MOVEit, and there are sure to...
Doing Less With Less: Focusing on Value – Source: www.darkreading.com
Source: www.darkreading.com – Author: Ben Johnson, Co-Founder and CTO, Obsidian Security The first half of this two-part article is here: “Cyber Essentialism & ‘Doing Less With...
US Government Provides Guidance on Software Security Guarantee Requirements – Source: www.securityweek.com
Source: www.securityweek.com – Author: Ionut Arghire The US Office of Management and Budget (OMB) has issued new guidance on when and how federal agencies should collect...
US Charges Russians With Hacking Cryptocurrency Exchange – Source: www.securityweek.com
Source: www.securityweek.com – Author: Ionut Arghire Two Russian nationals have been charged in the US with hacking the now-defunct cryptocurrency exchange Mt. Gox and conspiring to...
Intellihartx Informs 490k Patients of GoAnywhere-Related Data Breach – Source: www.securityweek.com
Source: www.securityweek.com – Author: Ionut Arghire Intellihartx, a company providing patient balance resolution services to hospitals, is informing roughly 490,000 individuals that their personal information was...
Software Supply Chain: The Golden Container Ship – Source: www.securityweek.com
Source: www.securityweek.com – Author: Matt Honea Today we find ourselves using cloud native technologies to increase flexibility, scaling and cost savings in many respects. The modern...
New MOVEit Vulnerabilities Found as More Zero-Day Attack Victims Come Forward – Source: www.securityweek.com
Source: www.securityweek.com – Author: Eduard Kovacs Progress Software has released another round of patches for its MOVEit products after researchers discovered new vulnerabilities while analyzing the...
Swiss Fear Government Data Stolen in Cyberattack – Source: www.securityweek.com
Source: www.securityweek.com – Author: AFP Switzerland said Thursday that government operational data might have been stolen in a cyberattack on the technology firm that provides software...
Fortinet Patches Critical FortiGate SSL VPN Vulnerability – Source: www.securityweek.com
Source: www.securityweek.com – Author: Eduard Kovacs Fortinet has patched a critical FortiGate vulnerability that can be exploited by an unauthenticated attacker for remote code execution, according...
Patching Required! New Critical SQL Injection Vulnerabilities Found in MOVEit – Source: heimdalsecurity.com
Source: heimdalsecurity.com – Author: Livia Gyongyoși Researchers discovered new critical SQL injection vulnerabilities in the MOVEit Transfer managed file transfer (MFT) solution. The flaws could enable...
What Is User Access Review? – Source: heimdalsecurity.com
Source: heimdalsecurity.com – Author: Antonia Din User access review is an essential component of any organization’s Identity and Access Management (IAM) strategy. Also known as access...
Threat Actors Target the University of Manchester in Cyberattack – Source: heimdalsecurity.com
Source: heimdalsecurity.com – Author: Livia Gyongyoși The University of Manchester network was reportedly hit by a cyberattack and the security team suspects data was stolen. Researchers...
Randall Munroe’s XKCD ‘Iceberg’ – Source: securityboulevard.com
Source: securityboulevard.com – Author: Marc Handelman Security Boulevard The Home of the Security Bloggers Network Community Chats Webinars Library Home Cybersecurity News Features Industry Spotlight News...
Spotlight Report: Authentication UX Has Widespread Business Impact – Source: securityboulevard.com
Source: securityboulevard.com – Author: HYPR Team Introduction Nearly every aspect of conducting business today begins with an act of authentication. Communicating, using tools, interacting with data,...
New BlackFog research: 61% of SMBs were victims of a cyberattack in the last year – Source: securityboulevard.com
Source: securityboulevard.com – Author: Brenda Robb New BlackFog research: 61% of SMBs were victims of a cyberattack in the last year Cheyenne, Wyoming, June 13, 2023...
BSidesSF 2023 – Dr. Amit Elazari – Keynote: Hacking Policy and Policy Hacking – A Hacker Guide to the Universe of Cyber Policy – Source: securityboulevard.com
Source: securityboulevard.com – Author: Marc Handelman Security Boulevard The Home of the Security Bloggers Network Community Chats Webinars Library Home Cybersecurity News Features Industry Spotlight News...
What a Mess: Barracuda Swaps Countless Appliances — Malware Can’t be Removed – Source: securityboulevard.com
Source: securityboulevard.com – Author: Richi Jennings Patching alone won’t cut it. Barracuda Networks is on the hook to exchange thousands of email security appliances. An unknown...
The Biggest Risks to the Software Supply Chain – Source: securityboulevard.com
Source: securityboulevard.com – Author: Esther Shein Software supply chain risks is an increasingly hot topic because attention to the supply chain has grown in recent years. ...
Insider Risk in the Financial Sector – Case Study – Source: securityboulevard.com
Source: securityboulevard.com – Author: Lucas Seewald Introduction The financial sector, the powerhouse of our economy, is increasingly becoming a prime target for cyber threats. With a...
Techno Security & Digital Forensics Conference East 2023 – A community defending against ever evolving threats – Source: securityboulevard.com
Source: securityboulevard.com – Author: Dwayne McDaniel If you have ever heard of Wilmington, North Carolina, it might be because the WW2 battleship North Carolina is moored...
The Answer to Optimizing Your Security Infrastructure? Consolidation – Source: securityboulevard.com
Source: securityboulevard.com – Author: Adi Ikan As the old saying goes, “Sometimes less is more”— an approach that rings true for security, too. But heightened concerns...
Cybercrime Predictions from an Industry Veteran: Dan Schaupner – Source: securityboulevard.com
Source: securityboulevard.com – Author: Lauren Yacono Security Boulevard The Home of the Security Bloggers Network Community Chats Webinars Library Home Cybersecurity News Features Industry Spotlight News...
Health Service Ireland latest victim of MOVEit cyber attack
Health Service Ireland (HSE) has become the latest victim of a supply chain cyber attack launched against document transfer service MOVEit. The attack was launched by...
AI data leaks are reaching crisis level: Take action – Source: www.cybertalk.org
Source: www.cybertalk.org – Author: slandau By Marco Eggerling, Field CISO, EMEA Much speculation surrounds how ChatGPT and similar technologies will change how we live and work....
MY TAKE: Will companies now heed attackers’ ultimatum in the MOVEit-Zellis supply chain hack? – Source: www.lastwatchdog.com
Source: www.lastwatchdog.com – Author: bacohido By Byron V. Acohido The cybersecurity community is waiting for the next shoe to drop in the wake of the audacious...
GUEST ESSAY: The key differences between ‘information privacy’ vs. ‘information security’ – Source: www.lastwatchdog.com
Source: www.lastwatchdog.com – Author: bacohido By John Bruggeman Information privacy and information security are two different things. Related: Tapping hidden pools of security talent Information privacy...