Source: www.darkreading.com – Author: Jai Vijayan, Contributing Writer, Dark Reading An attacker under the Magecart umbrella has infected an unknown number of e-commerce sites in the US,...
Month: June 2023
Microsoft Preps $425M Payment for LinkedIn GDPR Violations – Source: www.darkreading.com
Source: www.darkreading.com – Author: Dark Reading Staff, Dark Reading In a disclosure released by Microsoft, the company announced that it will reserve $425 million to pay a...
With SEC Rule Changes on the Horizon, Research Reveals Only 14% of CISOs Have Traits Desired for Cyber Expert Board Positions – Source: www.darkreading.com
Source: www.darkreading.com – Author: 1 BOSTON, June 6, 2023 /PRNewswire/ — Today, IANS Research, Artico Search and The CAP Group released its CISO as Board Directors – CISO Board...
ILTA and Conversant Group Release Cybersecurity Benchmarking Survey of the Legal Industry – Source: www.darkreading.com
Source: www.darkreading.com – Author: 1 CHATTANOOGA, Tenn. and CHICAGO, June 6, 2023 /PRNewswire/ — Law firms store some of the most sensitive information available regarding material business transactions, intellectual property,...
Netskope Intelligent SSE Selected by Transdev to Secure and Connect its Hybrid Workforce – Source: www.darkreading.com
Source: www.darkreading.com – Author: 1 Paris, June 6, 2023 – Netskope, a leader in Secure Access Service Edge (SASE), has today announced that it has been selected by Transdev,...
US Aerospace Contractor Hacked With ‘PowerDrop’ Backdoor – Source: www.darkreading.com
Source: www.darkreading.com – Author: Nate Nelson, Contributing Writer, Dark Reading Hackers utilizing native Windows tools have managed to infect at least one US defense contractor with...
BBC, Boots and British Airways affected by malware gang attack
A cyber attack against document transfer app MOVEit has resulted in data breaches of several high-profile UK organizations and businesses. Those affected includes the British Broadcasting...
ChatGPT Hallucinations Open Developers to Supply Chain Malware Attacks – Source: www.darkreading.com
Source: www.darkreading.com – Author: Elizabeth Montalbano, Contributor, Dark Reading Attackers can exploit ChatGPT’s penchant for returning false information to spread malicious code packages, researchers have found. This poses...
Only one in 10 CISOs today are board-ready, study says – Source: www.csoonline.com
Source: www.csoonline.com – Author: A report from cybersecurity firm IANS finds that more than half of public companies lack even one qualified director with cybersecurity expertise....
Lacework’s new CIEM uses ML to fish out high-risk identities – Source: www.csoonline.com
Source: www.csoonline.com – Author: The new CIEM will merge with existing threat detection capabilities to consolidate Lacework’s cloud security offering. Cloud security provider Lacework has released...
OWASP lists 10 most critical large language model vulnerabilities – Source: www.csoonline.com
Source: www.csoonline.com – Author: The list highlights the impact and prevalence of the 10 most critical vulnerabilities found in artificial intelligence applications based on LLMs. The...
Cloud misconfiguration causes massive data breach at Toyota Motor – Source: www.csoonline.com
Source: www.csoonline.com – Author: Vehicle data and customer information were exposed for over eight years due to a cloud misconfiguration at Toyota Motor that impacted over...
Department of Defense AI principles have a place in the CISO’s playbook – Source: www.csoonline.com
Source: www.csoonline.com – Author: Artificial intelligence has zoomed to the forefront of the public and professional discourse — as have expressions of fear that as AI...
Get to know CISO David Lindner | Code Patrol podcast | Contrast Security – Source: securityboulevard.com
Source: securityboulevard.com – Author: Lisa Vaas, Senior Content Marketing Manager, Contrast Security There are multiple ways to cheat at ice fishing, Contrast Security CISO David Lindner...
Browser Security: Key Threats and Best Practices – Source: securityboulevard.com
Source: securityboulevard.com – Author: Team Nuspire As the primary interface between employees and the internet, web browsers play a vital role in the IT ecosystems of...
CVE-2023-34362 – MOVEit Transfer – An attack chain that retrieves sensitive information – Source: securityboulevard.com
Source: securityboulevard.com – Author: Gabi Stapel MOVEit Transfer is a popular secure file transfer solution developed by Progress, a subsidiary of Ipswitch. At the moment, there...
Google Addresses Latest Zero-Day Affecting Chrome – Source: securityboulevard.com
Source: securityboulevard.com – Author: Flashpoint Table Of Contents New Chrome zero-day Yesterday, Google addressed another zero-day vulnerability affecting Google Chrome. The Flashpoint Intel Team quickly published...
Telegram Hacking Channels: An Emerging Risk – Source: securityboulevard.com
Source: securityboulevard.com – Author: Yuzuka Akasaka Telegram, a popular encrypted messaging app known for its commitment to privacy and security, has ironically become a hub for...
Exploit Forum, Initial Access Brokers, and Cybercrime on the Dark Web – Source: securityboulevard.com
Source: securityboulevard.com – Author: Yuzuka Akasaka The notorious Exploit.in dark web forum is a hotspot for cybercriminals and hosts an auction system. On this forum, malicious...
Malware as a Service: An Emerging Threat in 2023 – Source: securityboulevard.com
Source: securityboulevard.com – Author: Yuzuka Akasaka Capitalizing on the convenience of the Software as a Service (SaaS) model, malicious actors are offering Malware as a Service...
Babuk Ransomware Group: What You Need to Know – Source: securityboulevard.com
Source: securityboulevard.com – Author: Yuzuka Akasaka The Babuk ransomware group emerged into the world of illicit activities relatively recently in 2021. Since then, they have conducted...
Grief Ransomware Group: What You Need to Know – Source: securityboulevard.com
Source: securityboulevard.com – Author: Yuzuka Akasaka Among the multitude of threat actors dominating the cybersecurity landscape, Grief ransomware group has risen to prominence. Known for their...
Google fixed the third Chrome zero-day of 2023 – Source: securityaffairs.com
Source: securityaffairs.com – Author: Pierluigi Paganini Google released security updates to address a high-severity zero-day flaw in the Chrome web browser that it actively exploited in...
Cyclops Ransomware group offers a multiplatform Info Stealer – Source: securityaffairs.com
Source: securityaffairs.com – Author: Pierluigi Paganini Researchers from security firm Uptycs reported that threat actors linked to the Cyclops ransomware are offering a Go-based information stealer. The Cyclops group...
British Airways, BBC and Boots were impacted the by Zellis data breach – Source: securityaffairs.com
Source: securityaffairs.com – Author: Pierluigi Paganini The BBC and British Airways were both impacted by the data breach suffered by the payroll provider Zellis. As a...
KeePass fixed the bug that allows the extraction of the cleartext master password – Source: securityaffairs.com
Source: securityaffairs.com – Author: Pierluigi Paganini KeePass addressed the CVE-2023-32784 bug that allows the extraction of the cleartext master password from the memory of the client....
Microsoft Pays $20M to Settle FTC COPPA Complaint – Source: www.databreachtoday.com
Source: www.databreachtoday.com – Author: 1 Governance & Risk Management , Privacy FTC Says Violations Stem From Xbox Live Registration Process David Perera (@daveperera) • June 5,...
Live Webinar | Europe’s State of Ransomware 2023 & Beyond: MSP Protection Deep Dive – Source: www.databreachtoday.com
Source: www.databreachtoday.com – Author: 1 Markus Bauer Senior Technology Evangelist EMEA, Acronis Markus holds a degree as Information Electronics Engineer and has more than 25 years...
Cisco Doubles Down on Generative AI, SSE, Cloud App Security – Source: www.databreachtoday.com
Source: www.databreachtoday.com – Author: 1 Application Security , Artificial Intelligence & Machine Learning , Next-Generation Technologies & Secure Development EVP & GM Jeetu Patel on Simplifying...
Why Cyber Defenders Need Partnerships, Tools and Education – Source: www.databreachtoday.com
Source: www.databreachtoday.com – Author: 1 Since Russia began using cyberattacks in its war with Ukraine, we have seen how moving to the cloud has increased cyber...























