Data Security: Your Ultimate Duty to Your Online CustomerRetail business leaders deal with many risks that threaten their businesses' economic stability and viability. And while physical...
Year: 2023
ReversingLabs Threat Analysis and Hunting Solution January 2023 Update: Driving SecOps Forward
ReversingLabs Threat Analysis and Hunting Solution January 2023 Update: Driving SecOps Forward Learn how your organization can reduce cyber risks (as well as operational workload and...
Best Practices in Dependency Management: Cooking a Meal of Gourmet Code
Best Practices in Dependency Management: Cooking a Meal of Gourmet Code The post Best Practices in Dependency Management: Cooking a Meal of Gourmet Code appeared...
Tesla “Solar Factory” Implicated in FSD Fraud: Workers Directed to Classify Images for Driving
Tesla “Solar Factory” Implicated in FSD Fraud: Workers Directed to Classify Images for DrivingElon Musk launched the Tesla concept for chargers as solar powered. He promised...
Digital Trust Digest: This Week’s Must-Know News
Digital Trust Digest: This Week’s Must-Know NewsThe Digital Trust Digest is a curated overview of the week’s top cybersecurity news. Here's what happened the week of...
Step on It: What to Know About TISAX Compliance in the Automotive Market
Step on It: What to Know About TISAX Compliance in the Automotive MarketThe automotive industry is one of the largest in the world, with sales estimated...
5 Reasons to Consolidate Your Security Stack
5 Reasons to Consolidate Your Security StackHow SMEs Can Achieve Enterprise-Grade CybersecurityAlthough small to medium enterprises - SMEs - do not have the security resources larger...
Darknet Markets Using Custom Android Apps for Fulfillment
Darknet Markets Using Custom Android Apps for FulfillmentM-Club Used by at Least 7 Drug-Focused Russian-Language Markets, Researchers ReportDarknet markets offering illegal drugs and fraudster tools and...
No more holidays for US telcos, FCC is cracking down
No more holidays for US telcos, FCC is cracking downAlso, LastPass faces class action, and Louisiana says that, while the internet may be for porn, ID...
Cloud email services bolster encryption against hackers
Cloud email services bolster encryption against hackersGoogle, Microsoft and Proton launched new end-to-end encryption products to confront the 50% increase in ransomware, phishing and other email-vector...
How to configure an SMTP server in a self-hosted instance Passbolt
How to configure an SMTP server in a self-hosted instance PassboltWith the self-hosted Passbolt password manager, you must configure an SMTP server to use the collaboration...
US Flights Resume After Reported Computer Glitch Resolved
US Flights Resume After Reported Computer Glitch ResolvedSeparately, UK's Royal Mail Blames 'Cyber Incident' for Service DisruptionAnytime critical infrastructure gets disrupted, the first question inevitably seems...
Recent 2022 cyberattacks presage a rocky 2023
Recent 2022 cyberattacks presage a rocky 2023A spate of zero-day exploits against Twitter, Rackspace and others late last year showed the limits of a cybersecurity workforce...
Security risk assessment checklist
Security risk assessment checklistOrganizations, regardless of size, face ever-increasing information technology and data security threats. Everything from physical sites to data, applications, networks and systems are...
Twitter: Latest Dump Has ‘Already Publicly Available’ Data
Twitter: Latest Dump Has 'Already Publicly Available' DataReports 'No Evidence' Twitter Flaw Exploited to Amass Latest Leaked Data on UsersTwitter says a massive collection of purported...
BCDR Buyer’s Guide For MSPs
BCDR Buyer’s Guide For MSPsWhen a client’s server goes down or is compromised in a cyberattack, managed service providers (MSPs) need an effective business continuity and...
Twitter claims leaked data of 200M users not stolen from its systems
Twitter claims leaked data of 200M users not stolen from its systemsTwitter finally addressed reports that a dataset of email addresses linked to hundreds of millions of...
Scattered Spider hackers use old Intel driver to bypass security
Scattered Spider hackers use old Intel driver to bypass securityA financially motivated threat actor tracked as Scattered Spider was observed attempting to deploy Intel Ethernet diagnostics...
Business Continuity and Disaster Recovery Solutions Built For Managed Service Providers
Business Continuity and Disaster Recovery Solutions Built For Managed Service ProvidersCritical business data lives on servers, personal devices, and in the cloud. If any of that...
SIRIS Business Continuity and Disaster Recovery
SIRIS Business Continuity and Disaster RecoverySIRIS is fundamentally different than traditional backup and recovery solutions. Utilizing a cloud-first approach, managed service providers (MSPs) can offer their...
Exclusive: FDA Leader on Impact of New Medical Device Law
Exclusive: FDA Leader on Impact of New Medical Device LawThe $1.7 trillion omnibus spending bill signed into law last week by President Joe Biden contains new...
Fortinet: Govt networks targeted with now-patched SSL-VPN zero-day
Fortinet: Govt networks targeted with now-patched SSL-VPN zero-dayFortinet says unknown attackers exploited a FortiOS SSL-VPN zero-day vulnerability patched last month in attacks against government organizations and...
Supporting the Use of Rust in the Chromium Project
Supporting the Use of Rust in the Chromium ProjectPosted by Dana Jansens (she/her), Chrome Security Team We are pleased to announce that moving forward, the Chromium...
Vice Society ransomware claims attack on Australian firefighting service
Vice Society ransomware claims attack on Australian firefighting serviceAustralia's Fire Rescue Victoria has disclosed a data breach caused by a December cyberattack that is now claimed...
Amazing little-known ways to drive sustainability, IT and security growth
Amazing little-known ways to drive sustainability, IT and security growthEXECUTIVE SUMMARY: Sustainable business practices – it’s not just another buzzword. It’s a business opportunity. Organizations are...
European police takes down call centers behind cryptocurrency scams
European police takes down call centers behind cryptocurrency scamsMultiple call centers across Europe controlled by a criminal organization involved in online investment fraud were taken down...
Ransomware attacks are decreasing, but companies remain vulnerable
Ransomware attacks are decreasing, but companies remain vulnerableOnly 25% of the organizations surveyed by Delinea were hit by ransomware attacks in 2022, but fewer companies are...
You don’t choose your battles, they choose you
You don’t choose your battles, they choose youThere is a fundamental problem within the cyber security world, a problem that Gil Shwed believes Check Point is...
OpenAI’s ChatGPT bot: The hazardous malware that it easily spits out
OpenAI’s ChatGPT bot: The hazardous malware that it easily spits outEXECUTIVE SUMMARY: Late last year, the company called OpenAI released an artificially intelligent chatbot that has...
Gootkit Loader Actively Targets Australian Healthcare Industry
Gootkit Loader Actively Targets Australian Healthcare IndustryWe analyzed the infection routine used in recent Gootkit loader attacks on the Australian healthcare industry and found that Gootkit...