Source: www.bleepingcomputer.com – Author: Bill Toulas UK’s Information Commissioner’s Office (ICO), together with eleven data protection and privacy authorities from around the world, have published a...
Month: August 2023
Microsoft: Stealthy Flax Typhoon hackers use LOLBins to evade detection – Source: www.bleepingcomputer.com
Source: www.bleepingcomputer.com – Author: Bill Toulas Microsoft has identified a new hacking group it now tracks as Flax Typhoon that argets government agencies and education, critical manufacturing,...
Leaseweb is restoring ‘critical’ systems after security breach – Source: www.bleepingcomputer.com
Source: www.bleepingcomputer.com – Author: Sergiu Gatlan Leaseweb, one of the world’s largest cloud and hosting providers, notified people that it’s working on restoring “critical” systems disabled...
Kroll data breach exposes info of FTX, BlockFi, Genesis creditors – Source: www.bleepingcomputer.com
Source: www.bleepingcomputer.com – Author: Bill Toulas Multiple reports on social media warn of a data breach at financial and risk advisory company Kroll that resulted in...
BSides Cheltenham 2023 – Cristian Cornea – Bypassing Anti-Virus Using BadUSB – Source: securityboulevard.com
Source: securityboulevard.com – Author: Marc Handelman Yes, we have specific objectives for uptime and recovery Yes, we talk about resilience, but don’t have specific objectives It’s...
Kroll Employee SIM-Swapped for Crypto Investor Data – Source: securityboulevard.com
Source: securityboulevard.com – Author: BrianKrebs Security consulting giant Kroll disclosed today that a SIM-swapping attack against one of its employees led to the theft of user...
Daniel Stori’s ‘Python Robots’ – Source: securityboulevard.com
Source: securityboulevard.com – Author: Marc Handelman Yes, we have specific objectives for uptime and recovery Yes, we talk about resilience, but don’t have specific objectives It’s...
Perceptions, SaaS Identities and AI – Source: securityboulevard.com
Source: securityboulevard.com – Author: Beverly Nevalga, Sr. Content Marketing Manager @ AppOmni In his presentation, Brendan O’Connor examined Identity risk within the SaaS ecosystem. He broke...
API Abuse – Lessons from the Duolingo Data Scraping Attack – Source: securityboulevard.com
Source: securityboulevard.com – Author: Tim Erlin It’s been reported that 2.6 million user records sourced from the Duolingo app are for sale. The attacker apparently obtained...
NIST CSF 2.0: The Journey so Far and What’s Ahead – Source: securityboulevard.com
Source: securityboulevard.com – Author: Chris Griffith NIST CSF 1.1 to 2.0 is a significant update reflecting an inclusive and responsive approach to risk management. The most...
Versa Networks Adds Generative AI to SASE Platform – Source: securityboulevard.com
Source: securityboulevard.com – Author: Michael Vizard Versa Networks this week revealed it has extended its secure access service edge (SASE) platform to include generative artificial intelligence...
Scammers Target Online Markets with Telekopye Phishing Toolkit – Source: securityboulevard.com
Source: securityboulevard.com – Author: Jeffrey Burt Bad actors are using a full-featured phishing toolkit to target large numbers of users of popular online shopping sites like...
Cybersecurity Insights with Contrast CISO David Lindner | 8/25 – Source: securityboulevard.com
Source: securityboulevard.com – Author: David Lindner, Director, Application Security Yes, we have specific objectives for uptime and recovery Yes, we talk about resilience, but don’t have...
BSides Cheltenham 2023 – Welcome And Announcements By BSides Cheltenham Orga – Source: securityboulevard.com
Source: securityboulevard.com – Author: Marc Handelman Yes, we have specific objectives for uptime and recovery Yes, we talk about resilience, but don’t have specific objectives It’s...
Lazarus Group Debuts Tiny Trojan for Espionage Attacks – Source: www.databreachtoday.com
Source: www.databreachtoday.com – Author: 1 Critical Infrastructure Security , Cyberwarfare / Nation-State Attacks , Fraud Management & Cybercrime The Malware Is Based on an Unusual Development...
Live Fireside Chat | Getting Governance that Works – Source: www.databreachtoday.com
Source: www.databreachtoday.com – Author: 1 Digital Identity , Governance & Risk Management , Identity & Access Management Presented by Radiant Logic 60 minutes ...
ISMG Editors: The Shifting Cyber Insurance Landscape – Source: www.databreachtoday.com
Source: www.databreachtoday.com – Author: 1 Cyber Insurance , Governance & Risk Management , Video Also: Global Privacy Trends; Tornado Cash Founders Charged Anna Delaney (annamadeline) •...
UnitedHealthcare Fined $80K for 6-Month Records Access Delay – Source: www.databreachtoday.com
Source: www.databreachtoday.com – Author: 1 Healthcare , HIPAA/HITECH , Industry Specific HHS Settlement Is Agency’s 45th HIPAA ‘Right of Access’ Enforcement Action Marianne Kolbasuk McGee (HealthInfoSec)...
Chinese State Hackers ‘Flax Typhoon’ Targeting Taiwan – Source: www.databreachtoday.com
Source: www.databreachtoday.com – Author: 1 Cyberwarfare / Nation-State Attacks , Fraud Management & Cybercrime Likely Espionage Campaign Focuses on Persistence and Credential Dumping Prajeet Nair (@prajeetspeaks)...
Lazarus Group Debuts Tiny Trojan for Espionage Attacks – Source: www.govinfosecurity.com
Source: www.govinfosecurity.com – Author: 1 Critical Infrastructure Security , Cyberwarfare / Nation-State Attacks , Fraud Management & Cybercrime The Malware Is Based on an Unusual Development...
Live Fireside Chat | Getting Governance that Works – Source: www.govinfosecurity.com
Source: www.govinfosecurity.com – Author: 1 Digital Identity , Governance & Risk Management , Identity & Access Management Presented by Radiant Logic 60 minutes ...
ISMG Editors: The Shifting Cyber Insurance Landscape – Source: www.govinfosecurity.com
Source: www.govinfosecurity.com – Author: 1 Cyber Insurance , Governance & Risk Management , Video Also: Global Privacy Trends; Tornado Cash Founders Charged Anna Delaney (annamadeline) •...
UnitedHealthcare Fined $80K for 6-Month Records Access Delay – Source: www.govinfosecurity.com
Source: www.govinfosecurity.com – Author: 1 Healthcare , HIPAA/HITECH , Industry Specific HHS Settlement Is Agency’s 45th HIPAA ‘Right of Access’ Enforcement Action Marianne Kolbasuk McGee (HealthInfoSec)...
Chinese State Hackers ‘Flax Typhoon’ Targeting Taiwan – Source: www.govinfosecurity.com
Source: www.govinfosecurity.com – Author: 1 Cyberwarfare / Nation-State Attacks , Fraud Management & Cybercrime Likely Espionage Campaign Focuses on Persistence and Credential Dumping Prajeet Nair (@prajeetspeaks)...
Two LAPSUS$ Hackers Convicted in London Court for High-Profile Tech Firm Hacks – Source:thehackernews.com
Source: thehackernews.com – Author: . Aug 25, 2023THNCyber Crime / Data Breach Two U.K. teenagers have been convicted by a jury in London for being part...
Learn How Your Business Data Can Amplify Your AI/ML Threat Detection Capabilities – Source:thehackernews.com
Source: thehackernews.com – Author: . Aug 25, 2023The Hacker NewsThreat Detection / Artificial Intelligence In today’s digital landscape, your business data is more than just numbers—it’s...
Navigating Legacy Infrastructure: A CISO’s Actionable Strategy for Success – Source:thehackernews.com
Source: thehackernews.com – Author: . Every company has some level of tech debt. Unless you’re a brand new start-up, you most likely have a patchwork of...
China-Linked Flax Typhoon Cyber Espionage Targets Taiwan’s Key Sectors – Source:thehackernews.com
Source: thehackernews.com – Author: . Aug 25, 2023THNCyber Espionage A nation-state activity group originating from China has been linked to cyber attacks on dozens of organizations...
In Other News: Africa Cybercrime Crackdown, Unpatched macOS Flaw, Investor Disclosures – Source: www.securityweek.com
Source: www.securityweek.com – Author: Eduard Kovacs SecurityWeek is publishing a weekly cybersecurity roundup that provides a concise compilation of noteworthy stories that might have slipped under...
North Korean APT Hacks Internet Infrastructure Provider via ManageEngine Flaw – Source: www.securityweek.com
Source: www.securityweek.com – Author: Ionut Arghire The North Korea-linked advanced persistent threat (APT) actor Lazarus Group has been observed exploiting a Zoho ManageEngine vulnerability to compromise...