Source: go.theregister.com – Author: Team Register The Bumblebee malware loader seemingly vanished from the internet last October, but it’s back and – oddly – relying on...
Day: February 14, 2024
Australian Tax Office probed 150 staff over social media refund scam – Source: go.theregister.com
Source: go.theregister.com – Author: Team Register One hundred and fifty people who worked for the Australian Taxation Office (ATO) have been investigated – and some prosecuted...
Crims found and exploited these two Microsoft bugs before Redmond fixed ’em – Source: go.theregister.com
Source: go.theregister.com – Author: Team Register Patch Tuesday Microsoft fixed 73 security holes in this February’s Patch Tuesday, and you better get moving because two of...
Just one bad packet can bring down a vulnerable DNS server thanks to DNSSEC – Source: go.theregister.com
Source: go.theregister.com – Author: Team Register A single packet can exhaust the processing capacity of a vulnerable DNS server, effectively disabling the machine, by exploiting a...
QNAP vulnerability disclosure ends up an utter shambles – Source: go.theregister.com
Source: go.theregister.com – Author: Team Register Network-attached storage (NAS) specialist QNAP has disclosed and released fixes for two new vulnerabilities, one of them a zero-day discovered...
ALPHV blackmails Canadian pipeline after ‘stealing 190GB of vital info’ – Source: go.theregister.com
Source: go.theregister.com – Author: Team Register Updated Canada’s Trans-Northern Pipelines has allegedly been infiltrated by the ALPHV/BlackCat ransomware crew, which claims to have stolen 190 GB...
Fortinet’s week to forget: Critical vulns, disclosure screw-ups, and that toothbrush DDoS attack claim – Source: go.theregister.com
Source: go.theregister.com – Author: Team Register We’ve had to write the word “Fortinet” so often lately that we’re considering making a macro just to make our...
The ever-present state of cyber security alert – Source: go.theregister.com
Source: go.theregister.com – Author: Team Register Webinar As artificial intelligence (AI) technology becomes increasingly complex so do the threats from bad actors. It is like a...
India to make its digital currency programmable – Source: go.theregister.com
Source: go.theregister.com – Author: Team Register The Reserve Bank of India (RBI) announced on Thursday it would make its digital currency programmable, and ensure it can...
Microsoft, OpenAI Warn of Nation-State Hackers Weaponizing AI for Cyberattacks – Source:thehackernews.com
Source: thehackernews.com – Author: . Feb 14, 2024NewsroomArtificial Intelligence / Cyber Attack Nation-state actors associated with Russia, North Korea, Iran, and China are experimenting with artificial...
Adobe Patch Tuesday fixed critical vulnerabilities in Magento, Acrobat and Reader – Source: securityaffairs.com
Source: securityaffairs.com – Author: Pierluigi Paganini Adobe Patch Tuesday fixed critical vulnerabilities in Magento, Acrobat and Reader Pierluigi Paganini February 14, 2024 Adobe Patch Tuesday security...
Privacy Toolkit (GDPR+ and ISO 27701)
The content you are trying to access is private only to member users of the site. You must have a free membership at CISO2CISO.COM to access...
Prudential Financial breached in data theft cyberattack – Source: www.bleepingcomputer.com
Source: www.bleepingcomputer.com – Author: Sergiu Gatlan Prudential Financial has disclosed that its network was breached last week, with the attackers stealing employee and contractor data before being blocked...
Declining Ransomware Payments: Shift in Hacker Tactics? – Source: securityboulevard.com
Source: securityboulevard.com – Author: Team Nuspire Several cybersecurity advisories and agencies recommend not caving into ransomware gangs’ demands and paying their ransoms. For a while, though,...
Improving Software Quality with the OWASP BOM Maturity Model – Source: securityboulevard.com
Source: securityboulevard.com – Author: Deb Radcliff By Deb Radcliff, industry analyst and editor of CodeSecure’s TalkSecure educational blogs and podcasts (syndicated at Security Boulevard, YouTube, and...
Qmulos Launches Q-Compliance Core for Businesses in Need of a Modern Compliance Approach – Source: securityboulevard.com
Source: securityboulevard.com – Author: Alison Underdown As cyber threats grow alongside penalties for negligence, risk and compliance management has become a higher priority function across organizations,...
USENIX Security ’23 – Chenghong Wang, David Pujol, Kartik Nayak, Ashwin Machanavajjhal – Private Proof-of-Stake Blockchains using Differentially-Private Stake Distortion – Source: securityboulevard.com
Source: securityboulevard.com – Author: Marc Handelman Security Bloggers Network Home » Security Bloggers Network » USENIX Security ’23 – Chenghong Wang, David Pujol, Kartik Nayak, Ashwin...
Exploiting Kubernetes through Operator Injection – Source: securityboulevard.com
Source: securityboulevard.com – Author: Thomas Tan Intro The Kubernetes documentation describes operators as “software extensions to Kubernetes that use custom resources to manage applications and their components.” These...
News alert: Kiteworks named as a founding member of NIST’s new AI safety consortium – ‘AISIC’ – Source: securityboulevard.com
Source: securityboulevard.com – Author: bacohido San Mateo, Calif., Feb. 13, 2023 – The U.S. White House announced groundbreaking collaboration between OpenPolicy and leading innovation companies, including...
‘Incompetent’ FCC Fiddles With Data Breach Rules – Source: securityboulevard.com
Source: securityboulevard.com – Author: Richi Jennings While Rome burns, Federal Communications Commission is once again behind the curve. The FCC is telling telcos to tell them about data...
Guide to Advanced Fraud Monitoring & Proactive Detection in 2024 – Source: securityboulevard.com
Source: securityboulevard.com – Author: DataDome If you sell anything online or store any sensitive information digitally, you’re at risk of fraud. Online payment fraud losses doubled...
Comic Agilé – Mikkel Noe-Nygaard, Luxshan Ratnaravi – #278 – The Non-Senior Consultant – Source: securityboulevard.com
Source: securityboulevard.com – Author: Marc Handelman Wednesday, February 14, 2024 Security Boulevard The Home of the Security Bloggers Network Community Chats Webinars Library Home Cybersecurity News...
Reshaping Trust and Security for the Realities of 2024 – Source: securityboulevard.com
Source: securityboulevard.com – Author: Jenn Markey The new year is always a time for reflection, and after a year shaped by AI, biometrics, and nation-state attacks...
Europe’s AI Act Poised To Become Law After Committees Vote – Source: www.databreachtoday.com
Source: www.databreachtoday.com – Author: 1 Artificial Intelligence & Machine Learning , Legislation & Litigation , Next-Generation Technologies & Secure Development ACt Will Require Developers to Allows...
Responsible Use of Artificial Intelligence – Source: www.databreachtoday.com
Source: www.databreachtoday.com – Author: 1 Artificial Intelligence & Machine Learning , Governance & Risk Management , Next-Generation Technologies & Secure Development A Practical Guide for Cybersecurity...
Generative AI and the Brave New World of Work – Source: www.databreachtoday.com
Source: www.databreachtoday.com – Author: 1 Artificial Intelligence & Machine Learning , Next-Generation Technologies & Secure Development , Professional Certifications & Continuous Training CyberEd.io’s Steve King on...
USPTO: AI Can Assist Inventors But Can’t Hold Patents – Source: www.databreachtoday.com
Source: www.databreachtoday.com – Author: 1 Artificial Intelligence & Machine Learning , Next-Generation Technologies & Secure Development Humans Must Show Significant Role in AI-Assisted Cases for Inventor...
More Signs of a Qakbot Resurgence – Source: www.databreachtoday.com
Source: www.databreachtoday.com – Author: 1 Cybercrime , Endpoint Detection & Response (EDR) , Fraud Management & Cybercrime Qakbot Wouldn’t Be the First Trojan to Come Back...
Sophos Wins Top Employer Awards in British Columbia, Canada – Source: news.sophos.com
Source: news.sophos.com – Author: Byron Price #SophosLife Sophos has been named as one of the top employers in British Columbia, Canada for the eighth year running....
They’re Back? HHS OCR Is Eyeing the Return of HIPAA Audits – Source: www.databreachtoday.com
Source: www.databreachtoday.com – Author: 1 Healthcare , Industry Specific , Standards, Regulations & Compliance The Agency Is Surveying Previous Auditees to Reassess the Dormant Program Marianne...