Source: www.techrepublic.com – Author: Threats from malware, cryptographic infections and compromised networks have never been greater. Headlines regularly attest to such widespread problems, from infection-felled organizations...
Month: April 2024
NIST Cybersecurity Framework: A Cheat Sheet for Professionals (Free PDF) – Source: www.techrepublic.com
Source: www.techrepublic.com – Author: The tech world has a problem: Security fragmentation. There’s no standard set of rules or even language for mitigating cyber risk used...
AT&T, Verizon, Sprint, T-Mobile US fined $200M for selling off people’s location info – Source: go.theregister.com
Source: go.theregister.com – Author: Team Register The FCC on Monday fined four major US telcos almost $200 million for “illegally” selling subscribers’ location information to data...
Google blocked 2.3M apps from Play Store last year for breaking the G law – Source: go.theregister.com
Source: go.theregister.com – Author: Team Register Google says it stopped 2.28 million Android apps from being published in its official Play Store last year because they...
London Drugs closes all of its pharmacies following ‘cybersecurity incident’ – Source: go.theregister.com
Source: go.theregister.com – Author: Team Register Updated Canadian pharmacy chain London Drugs closed all of its stores over the weekend until further notice following a “cybersecurity...
France willing to buy key Atos assets to keep them French – Source: go.theregister.com
Source: go.theregister.com – Author: Team Register The French government has tabled an offer to buy key assets of ailing IT giant Atos after the company late...
UK lays down fresh legislation banning crummy default device passwords – Source: go.theregister.com
Source: go.theregister.com – Author: Team Register Smart device manufacturers will have to play by new rules in the UK as of today, with laws coming into...
Watchdog reveals lingering Google Privacy Sandbox worries – Source: go.theregister.com
Source: go.theregister.com – Author: Team Register The UK Competition and Markets Authority (CMA) still has privacy and competition concerns about Google’s Privacy Sandbox advertising toolkit, which...
The next step up for high-impact identity authorization – Source: go.theregister.com
Source: go.theregister.com – Author: Team Register Sponsored Feature As business enters the 2020s, organizations find themselves protecting fast-expanding digital estates using security concepts that are decades...
Discord dismantles Spy.pet site that snooped on millions of users – Source: go.theregister.com
Source: go.theregister.com – Author: Team Register Updated – Infosec in brief They say sunlight is the best disinfectant, and that appears to have been true in...
Kaiser Permanente handed over 13.4M people’s data to Microsoft, Google, others – Source: go.theregister.com
Source: go.theregister.com – Author: Team Register Millions of Kaiser Permanente patients’ data was likely handed over to Google, Microsoft Bing, X/Twitter, and other third-parties, according to...
Second time lucky for Thoma Bravo, which scoops up Darktrace for $5.3B – Source: go.theregister.com
Source: go.theregister.com – Author: Team Register Private equity investor Thoma Bravo has successfully completed a second acquisition attempt of UK-based cybersecurity company Darktrace in a $5.3...
ToddyCat is making holes in your infrastructure – Source: securelist.com
Source: securelist.com – Author: Andrey Gunkin, Alexander Fedotov, Natalya Shornikova We continue covering the activities of the APT group ToddyCat. In our previous article, we described...
Assessing the Y, and How, of the XZ Utils incident – Source: securelist.com
Source: securelist.com – Author: GReAT High-end APT groups perform highly interesting social engineering campaigns in order to penetrate well-protected targets. For example, carefully constructed forum responses...
Japanese police create fake support scam payment cards to warn victims – Source: www.bleepingcomputer.com
Source: www.bleepingcomputer.com – Author: Bill Toulas Image: AI-generated via Midjourney Japanese police placed fake payment cards in convenience stores to protect the elderly targeted by tech...
Zero Trust strategies for navigating IoT/OT security challenges – Source: www.cybertalk.org
Source: www.cybertalk.org – Author: slandau Travais ‘Tee’ Sookoo leverages his 25 years of experience in network security, risk management, and architecture to help businesses of all...
GUEST ESSAY: Here’s why securing smart cities’ critical infrastructure has become a top priority – Source: www.lastwatchdog.com
Source: www.lastwatchdog.com – Author: bacohido By Zac Amos Critical infrastructure like electrical, emergency, water, transportation and security systems are vital for public safety but can be...
Breaking Down Cybersecurity: The Real Meaning Behind the Jargon – Source: securityboulevard.com
Source: securityboulevard.com – Author: Matt Palmer Cyber security is often conflated with the term confidentiality, but that is not correct. Traditionally, professionals tend to define it...
Russian FSB Counterintelligence Chief Gets 9 Years in Cybercrime Bribery Scheme – Source: krebsonsecurity.com
Source: krebsonsecurity.com – Author: BrianKrebs The head of counterintelligence for a division of the Russian Federal Security Service (FSB) was sentenced last week to nine years...
Baby ASO: A Minimal Viable Transformation for Your SOC – Source: securityboulevard.com
Source: securityboulevard.com – Author: Anton Chuvakin Vaguely relevant but very cyber image from Dall-E One pattern I spotted after looking at the evolution of IT and security...
LabHost Phishing Platform is Latest Target of International Law Agencies – Source: securityboulevard.com
Source: securityboulevard.com – Author: Jeffrey Burt The takedown this week of a massive phishing-as-a-service (PhaaS) operation spanned law enforcement agencies from both sides of the Atlantic...
Choosing SOC Tools? Read This First [2024 Guide] – Source: securityboulevard.com
Source: securityboulevard.com – Author: Shriram Sharma Security operations centers (SOCs) are the front lines in the battle against cyber threats. They use a diverse array of...
USENIX Security ’23 – GAP: Differentially Private Graph Neural Networks with Aggregation Perturbation – Source: securityboulevard.com
Source: securityboulevard.com – Author: Marc Handelman Authors/Presenters: *Sina Sajadmanesh, Ali Shahin Shamsabadi, Aurélien Bellet, Daniel Gatica-Perez* Many thanks to USENIX for publishing their outstanding USENIX Security...
SafeBreach Coverage for AA24-109A (Akira Ransomware) – Source: securityboulevard.com
Source: securityboulevard.com – Author: Kaustubh Jagtap Author: Kaustubh Jagtap, Product Marketing Director, SafeBreach On April 18th, the United States’ Federal Bureau of Investigation (FBI), Cybersecurity and...
Taking Time to Understand NIS2 Reporting Requirements – Source: securityboulevard.com
Source: securityboulevard.com – Author: Brian Robertson The newest version of the European Union Network and Information Systems directive, or NIS2, came into force in January 2023....
Daniel Stori’s ‘WC’ – Source: securityboulevard.com
Source: securityboulevard.com – Author: Marc Handelman via the inimitable Daniel Stori at Turnoff.US! Permalink *** This is a Security Bloggers Network syndicated blog from Infosecurity.US authored...
USENIX Security ’23 – Inductive Graph Unlearning – Source: securityboulevard.com
Source: securityboulevard.com – Author: Marc Handelman Security Bloggers Network Home » Security Bloggers Network » USENIX Security ’23 – Inductive Graph Unlearning by Marc Handelman on...
From DAST to dawn: why fuzzing is better solution | Code Intelligence – Source: securityboulevard.com
Source: securityboulevard.com – Author: Natalia Kazankova Security testing allows you to evaluate the robustness of applications and systems and identify potential weaknesses that attackers may exploit....
Cybersecurity Insights with Contrast CISO David Lindner | 4/19/24 – Source: securityboulevard.com
Source: securityboulevard.com – Author: David Lindner, Director, Application Security Insight #1 One of the most significant errors an organization can make is assuming they are not...
UK ICO Weighs Role of ‘Accuracy’ in Generative AI – Source: www.databreachtoday.com
Source: www.databreachtoday.com – Author: 1 Artificial Intelligence & Machine Learning , Governance & Risk Management , Next-Generation Technologies & Secure Development But Accurate Data Doesn’t Always...