Source: www.govinfosecurity.com – Author: 1 Governance & Risk Management , Managed Security Service Provider (MSSP) , Video OpenText Cybersecurity Director Steven Wood on Consolidation, Skills Shortage...
Day: August 1, 2023
Tennessee Heart Clinic Tells 170,000 of Hacking, Data Breach – Source: www.govinfosecurity.com
Source: www.govinfosecurity.com – Author: 1 Breach Notification , Healthcare , Industry Specific Attack Detected in Mid-April But Hackers Accessed, Acquired Patient Files in March Marianne Kolbasuk...
Why Security Leaders Need to Have a ‘Broadness of Skills’ – Source: www.govinfosecurity.com
Source: www.govinfosecurity.com – Author: 1 Leadership & Executive Communication , Training & Security Leadership , Video Security Analyst Paul Watts on How the CISO’s Role Is...
Hosting Provider Accused of Facilitating Nation-State Hacks – Source: www.govinfosecurity.com
Source: www.govinfosecurity.com – Author: 1 Cybercrime as-a-service , Fraud Management & Cybercrime Researchers Allege Cloudzy Lacks Know-Your-Customer Safeguards, Operates From Iran Mathew J. Schwartz (euroinfosec) •...
Forgepoint Capital Places $15M Series A Bet on Converge Insurance – Source: www.securityweek.com
Source: www.securityweek.com – Author: Ryan Naraine Venture capital outfit Forgepoint Capital has placed another bet in the cyber-insurance sector, leading a $15 million funding round for...
Nearly All Modern CPUs Leak Data to New Collide+Power Side-Channel Attack – Source: www.securityweek.com
Source: www.securityweek.com – Author: Eduard Kovacs A new side-channel attack method that can lead to data leakage works against nearly any modern CPU, but we’re unlikely...
Iran-Run ISP ‘Cloudzy’ Caught Supporting Nation-State APTs, Cybercrime Hacking Groups – Source: www.securityweek.com
Source: www.securityweek.com – Author: Ionut Arghire Researchers at cybersecurity startup Halcyon has unmasked an Iranian-run company providing command-and-control services to more than 20 hacking groups, including...
Socket Scores $20M as Investors Bet on Software Supply Chain Security Startups – Source: www.securityweek.com
Source: www.securityweek.com – Author: Ryan Naraine Socket, an early-stage startup tackling software supply chain security, has snagged $20 million in new financing as investors continue to...
SpecterOps Updates BloodHound Active Directory Mapping Tool – Source: www.securityweek.com
Source: www.securityweek.com – Author: Kevin Townsend BloodHound is SpecterOps’ graph-based map of Active Directory relationships used by external pentesters (and malicious attackers), and internal users to...
Silk Security Emerges from Stealth With $12.5 Million Seed Funding – Source: www.securityweek.com
Source: www.securityweek.com – Author: Kevin Townsend New York based Silk Security has raised $12.5 million in a seed funding round led by Insight Partners and Hetz...
Nile Raises $175 Million for Secure NaaS Solutions – Source: www.securityweek.com
Source: www.securityweek.com – Author: Ionut Arghire Network-as-a-service (NaaS) solutions provider Nile today announced that it has raised $175 million in Series C funding, which brings the...
Hacker Conversations: Youssef Sammouda, Bug Bounty Hunter – Source: www.securityweek.com
Source: www.securityweek.com – Author: Kevin Townsend Youssef Sammouda is a Tunisian security researcher who focuses on bug bounty programs. He describes himself as, “Vulnerability researcher with...
Ransomware Attacks on Industrial Organizations Doubled in Past Year: Report – Source: www.securityweek.com
Source: www.securityweek.com – Author: Eduard Kovacs The number of ransomware attacks targeting industrial organizations and infrastructure has doubled since the second quarter of 2022, according to...
Bedding Giant Tempur Sealy Takes Systems Offline Following Cyberattack – Source: www.securityweek.com
Source: www.securityweek.com – Author: Ionut Arghire Bedding products giant Tempur Sealy (NYSE: TPX) has shut down certain systems after falling victim to a cyberattack, the company...
Canon Advises Users to Reset Wi-Fi Settings When Discarding Inkjet Printers – Source: heimdalsecurity.com
Source: heimdalsecurity.com – Author: Madalina Popovici Canon is cautioning users of home, office, and large format inkjet printers that their devices’ Wi-Fi connection settings are not...
Fake Android App Used to Exfiltrate Signal and WhatsApp User Data – Source: heimdalsecurity.com
Source: heimdalsecurity.com – Author: Madalina Popovici A fake Android app called ‘SafeChat’ is used by malicious actors to infect devices with spyware malware that allows them...
8 Best CrowdStrike Competitors [2023] – Source: heimdalsecurity.com
Source: heimdalsecurity.com – Author: Adelina Deaconu Due to the constantly changing nature of cyber threats, businesses must implement strong security solutions. Here is where CrowdStrike competitors...
Novel Worm-Like Malware P2Pinfect Targets Redis Deployments – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: 1 A new and sophisticated malware campaign named “P2Pinfect” has been observed targeting publicly-accessible deployments of the Redis data store. According to a...
Canon Inkjet Printers Expose Wi-Fi Threat – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: 1 Canon has raised concerns over potential security risks linked to the disposal of inkjet printers. In a security advisory published on...
Cloud Tech Debt Puts Millions of Apps at Risk, Says New Report – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: 1 A new report has shed light on critical cloud risks, with a focus on the growing threat of cloud tech debt. ...
New Infostealer Uncovered in Phishing Scam Targeting Facebook Business Accounts – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: 1 Unit 42 researchers have uncovered another phishing campaign designed to take over Facebook business accounts using a newly identified infostealer variant....
NHS Staff Reprimanded For WhatsApp Data Sharing – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: 1 An NHS trust has been reprimanded by the UK’s data protection regulator after it was discovered that staff had been sharing...
Capita Boss to Step Down – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: 1 The boss of one of Europe’s largest outsourcing companies has announced his retirement, several months after the firm suffered a cyber-attack...
Hacking AI Resume Screening with Text in a White Font – Source: www.schneier.com
Source: www.schneier.com – Author: Bruce Schneier The Washington Post is reporting on a hack to fool automatic resume sorting programs: putting text in a white font....
Retail chain Hot Topic discloses wave of credential-stuffing attacks – Source: www.bleepingcomputer.com
Source: www.bleepingcomputer.com – Author: Bill Toulas American apparel retailer Hot Topic is notifying customers about multiple cyberattacks between February 7 and June 21 that resulted in...
Cybercriminals train AI chatbots for phishing, malware attacks – Source: www.bleepingcomputer.com
Source: www.bleepingcomputer.com – Author: Bill Toulas In the wake of WormGPT, a ChatGPT clone trained on malware-focused data, a new generative artificial intelligence hacking tool called...
How to manage a mass password reset due to a ransomware attack – Source: www.bleepingcomputer.com
Source: www.bleepingcomputer.com – Author: Sponsored by Specops Software Interrupted classes, disrupted planning, and postponed events – IT outages have a big impact on modern university life....
European Bank Customers Targeted in SpyNote Android Trojan Campaign – Source:thehackernews.com
Source: thehackernews.com – Author: . Aug 01, 2023THNMobile Security / Malware Various European customers of different banks are being targeted by an Android banking trojan called...
What is Data Security Posture Management (DSPM)? – Source:thehackernews.com
Source: thehackernews.com – Author: . Data Security Posture Management is an approach to securing cloud data by ensuring that sensitive data always has the correct security...
Researchers Expose Space Pirates’ Cyber Campaign Across Russia and Serbia – Source:thehackernews.com
Source: thehackernews.com – Author: . Aug 01, 2023THNCyber Attack / Malware The threat actor known as Space Pirates has been linked to attacks against at least...