Source: www.darkreading.com – Author: Karen Spiegelman, Features Editor In response to widespread and dangerous vulnerabilities such as Log4j and the exploited GoAnywhere remote-code execution flaw, savvy...
Day: July 12, 2023
Chinese APT Cracks Microsoft Outlook Emails at 25 Government Agencies – Source: www.darkreading.com
Source: www.darkreading.com – Author: Nate Nelson, Contributing Writer, Dark Reading This spring, a Chinese threat actor had access to email accounts across 25 government agencies in...
Hackers Say Generative AI Unlikely to Replace Human Cybersecurity Skills According to Bugcrowd Survey – Source: www.darkreading.com
Source: www.darkreading.com – Author: 1 SAN FRANCISCO, July 12, 2023 /PRNewswire/ — Bugcrowd, a multi-solution crowdsourced cybersecurity platform, today released its annual “Inside the Mind of a Hacker” report for 2023,...
Firedome Integrates With Microsoft Defender for IoT to Enhance IoT Device Security, Using Microsoft Sentinel – Source: www.darkreading.com
Source: www.darkreading.com – Author: 1 NEW YORK, July 12, 2023 /PRNewswire/ — Firedome, a global IoT Endpoint Protection leader, announces its integration with Microsoft Defender for IoT, using...
Console & Associates, P.C. Investigates HCA Healthcare After Report of Data Breach Affecting an Estimated 11M Patients – Source: www.darkreading.com
Source: www.darkreading.com – Author: 1 MARLTON, N.J., July 12, 2023 /PRNewswire/ — Approximately 11 million patients are being notified that their personal information was compromised after an unauthorized party...
(ISC)² Strengthens DEI Initiatives through Global Partnerships – Source: www.darkreading.com
Source: www.darkreading.com – Author: 1 ALEXANDRIA, Va., July 12, 2023 /PRNewswire/ — (ISC)² – the world’s largest nonprofit association of certified cybersecurity professionals – today announced the expansion of its...
Less Than Half of SMBs Deploy Privileged Access Management – Source: www.darkreading.com
Source: www.darkreading.com – Author: 1 CHICAGO, July 12, 2023 /PRNewswire/ — Most successful breaches involve stolen or compromised credentials that are used to escalate privileges and move laterally...
QuickBlox API Vulnerabilities Open Video, Chat Users to Data Theft – Source: www.darkreading.com
Source: www.darkreading.com – Author: Dark Reading Staff, Dark Reading After digging into QuickBlox’s software development kit and application programming interface (API), Team 82 alongside Check Point...
How to Put Generative AI to Work in Your Security Operations Center – Source: www.darkreading.com
Source: www.darkreading.com – Author: A.N. Ananth, Chief Strategy Officer, Netsurion Generative AI is taking the IT security industry by storm. Every vendor has a story to...
White House Urged to Quickly Nominate National Cyber Director – Source: www.darkreading.com
Source: www.darkreading.com – Author: Nathan Eddy, Contributing Writer, Dark Reading In a letter addressed to the White House Chief of Staff, the Cybersecurity Coalition urged the...
11 Million Patients` Data Stolen in HCA Healthcare Data Breach – Source: heimdalsecurity.com
Source: heimdalsecurity.com – Author: Livia Gyongyoși HCA Healthcare, one of the largest health companies in the USA, announced on July 10th it was the target of...
EU Healthcare: ENISA Reports that 54% of Cyber Threats Are Ransomware – Source: heimdalsecurity.com
Source: heimdalsecurity.com – Author: Madalina Popovici The European Union Agency for Cybersecurity (ENISA) has released its first cyber threat landscape report for the health sector, revealing...
Deutsche Bank, ING, and Postbank Customers` Data Exposed in Breach – Source: heimdalsecurity.com
Source: heimdalsecurity.com – Author: Livia Gyongyoși Deutsche Bank, ING Bank, Postbank, and Comdirect recently announced they suffered customer data leaks. Reportedly, the four European giant banks...
Zero-day Alert! Microsoft Unpatched Vulnerability Exploited in NATO Summit Attacks – Source: heimdalsecurity.com
Source: heimdalsecurity.com – Author: Livia Gyongyoși Microsoft warns that hackers are exploiting an unpatched zero-day present in several Windows and Office products. The bug enables malicious...
Access Governance Strategy and Technology: How to Plan It Well – Source: heimdalsecurity.com
Source: heimdalsecurity.com – Author: Vladimir Unterfingher Over the past couple of years, increasingly more sysadmins have abandoned the more “traditional”, hands-on, approach to access and identity...
Patch Tuesday July 2023 – Microsoft Publishes Bug Fixes for 142 Vulnerabilities – Source: heimdalsecurity.com
Source: heimdalsecurity.com – Author: Vladimir Unterfingher The second month of summer comes a-calling with a hefty list of bug fixes; throughout July, Microsoft has released no...
Diplomats in Ukraine Targeted by “Staggering” BMW Phishing Campaign – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: 1 A notorious Russian state-affiliated cyber gang has leveraged a legitimate sale of a BMW car to target diplomats in Kyiv, Ukraine,...
Ethical Hackers Reveal How They Use Generative AI – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: 1 Nearly three-quarters (72%) of white hat hackers do not believe that generative AI can replace human creativity in security research and...
Financial Industry Faces Soaring Ransomware Threat – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: 1 The financial industry has been facing a surge in ransomware attacks over the past few years, said cybersecurity provider SOCRadar in...
Crypto Crime Down 62% but Ransomware Activity Surges – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: 1 Cryptocurrency flows to known criminal entities were down 65% in the first half of 2023 compared to the same period in...
Scam Page Volumes Surge 304% Annually – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: 1 Security researchers have recorded a 62% year-on-year (YoY) increase in phishing websites and a 304% surge in scam pages in 2022....
Microsoft Fixes Six Zero-Days This Patch Tuesday – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: 1 Microsoft issued a record-breaking 132 new fixes for vulnerabilities this month and detailed six zero-day bugs, including one being actively exploited...
OAuth Token: What It Is, How It Works, and Its Vulnerabilities – Source: securityboulevard.com
Source: securityboulevard.com – Author: Tamara Bailey, Content Marketing Specialist @ AppOmni Previous security breaches at Heroku and GitHub serve as stark reminders that OAuth token theft...
10 Best Practices for Data Protection & Confidentiality Training – Source: securityboulevard.com
Source: securityboulevard.com – Author: Cavelo Blog Did you know that your company’s employees are your biggest cybersecurity risk? In fact, 52 percent of businesses admit that...
Four Steps to Cutting Cybersecurity Budgets Without Increasing Risk – Source: securityboulevard.com
Source: securityboulevard.com – Author: Ori Arbel The projected total cost of cybercrime for 2023 is estimated to be a staggering $8 trillion. This explains why businesses...
Safe Security Acquires RiskLens to Become Undisputed Leader in the $4B Cyber Risk Quantification and Management (CRQM) Market – Source: securityboulevard.com
Source: securityboulevard.com – Author: RiskLens Powerful combination of SAFE Platform’s industry defining AI capabilities coupled with the industry standard FAIR model for cyber risk quantification, that...
Concerns About Infostealer Malware on the Rise – Source: securityboulevard.com
Source: securityboulevard.com – Author: Michael Vizard A survey of 320 IT security professionals in the U.S. and the United Kingdom found more than half (53%) are...
Cybersecurity Needs to Mitigate Complexity – Source: securityboulevard.com
Source: securityboulevard.com – Author: Steve Winterfeld Bruce Schneier’s quote, “Complexity is the enemy of security,” is one of my favorite sayings. It sums up one of...
Have You Been Pwned? – What is it and how to prevent it – Source: securityboulevard.com
Source: securityboulevard.com – Author: Ahona Rudra Email addressed can be compromised to initiate major data breaches that can lead to the loss of your assets and...
What we told the CFTC about crypto threats – Source: securityboulevard.com
Source: securityboulevard.com – Author: Trail of Bits Dan Guido, CEO In March, I joined the Commodity Futures Trading Commission’s Technology Advisory Committee (TAC), helping the regulatory...