Source: go.theregister.com – Author: Team Register A cybersecurity expert could face a 20-year prison sentence after being accused of trying to extort a multinational IT infrastructure...
Month: May 2024
ISMG Editors: Opening Day Overview of RSA Conference 2024 – Source: www.databreachtoday.com
Source: www.databreachtoday.com – Author: 1 Artificial Intelligence & Machine Learning , Events , Fraud Management & Cybercrime Ransomware, AI Technology and the Art of the Possible...
Enterprise Technology Management: No Asset Management Silos – Source: www.databreachtoday.com
Source: www.databreachtoday.com – Author: 1 An enterprise has many different types of technology in its estate – including software, hardware and infrastructure – and historically each...
The Challenges in Keeping Medical Device Software Updated – Source: www.databreachtoday.com
Source: www.databreachtoday.com – Author: 1 Updating software as new vulnerabilities are discovered persistently remains a top cybersecurity challenge involving medical devices, said David Brumley, a cybersecurity...
Microsoft Overhauls Security Practices After Major Breaches – Source: www.databreachtoday.com
Source: www.databreachtoday.com – Author: 1 Governance & Risk Management , IT Risk Management Company Plans to Link Executive Compensation to Achieving Security Milestones Chris Riotta (@chrisriotta)...
LevelBlue Leverages AI for Threat Intel Following AT&T Split – Source: www.databreachtoday.com
Source: www.databreachtoday.com – Author: 1 Artificial Intelligence & Machine Learning , Next-Generation Technologies & Secure Development AI Investments and Global Expansion Set to Propel Growth After...
Operation Cronos Again Threatens to Reveal LockBitSupp – Source: www.databreachtoday.com
Source: www.databreachtoday.com – Author: 1 Fraud Management & Cybercrime , Ransomware International Police Operation Revives Seized LockBit Dark Web Leak Site Prajeet Nair (@prajeetspeaks) • May...
Key strategies for building cyber resilience in 2024 – Source: www.cybertalk.org
Source: www.cybertalk.org – Author: slandau By Deryck Mitchelson, Field CISO EMEA, Check Point. This article was originally published via the World Economic Forum and reprinted with...
UK armed forces’ personal data hacked in MoD breach – Source: www.theguardian.com
Source: www.theguardian.com – Author: Tom Ambrose and agency The Ministry of Defence has suffered a significant data breach and the personal information of UK military personnel...
New Lawsuit Attempting to Make Adversarial Interoperability Legal – Source: www.schneier.com
Source: www.schneier.com – Author: Bruce Schneier HomeBlog Comments Winter • May 6, 2024 8:30 AM The whole lawsuit hinges around this text in the law (c)(2)(B):...
Citrix Addresses High-Severity Flaw in NetScaler ADC and Gateway – Source: www.darkreading.com
Source: www.darkreading.com – Author: Jai Vijayan, Contributing Writer Source: Ken Wolter via Shutterstock Citrix appears to have quietly addressed a vulnerability in its NetScaler Application Delivery...
Supply Chain Breaches Up 68% Year Over Year, According to DBIR – Source: www.darkreading.com
Source: www.darkreading.com – Author: Nate Nelson, Contributing Writer Source: Kheng Ho Toh via Alamy Stock Photo Breaches resulting from a third party were up 68% last...
LLMs & Malicious Code Injections: ‘We Have to Assume It’s Coming’ – Source: www.darkreading.com
Source: www.darkreading.com – Author: Jeffrey Schwartz, Contributing Writer Source: Bakhtiar Zein via Alamy Stock Vector A rise in prompt injection engineering into large language models (LLMs)...
AttackIQ Partners With Cyber Poverty Line Institute to Provide Academy Courses to Underserved Communities – Source: www.darkreading.com
Source: www.darkreading.com – Author: PRESS RELEASE SANTA CLARA, Calif. – May 6, 2024 – AttackIQ®, the leading independent vendor of breach and attack simulation (BAS) solutions and founding...
BigID Launches Industry-First Hybrid Scanning for Cloud Native Workloads – Source: www.darkreading.com
Source: www.darkreading.com – Author: PRESS RELEASE SAN FRANCISCO, May 6, 2024 /PRNewswire/ — BigID, the pioneer in AI-augmented data security, compliance, and privacy for modern cloud-first enterprises, today announced...
Introducing the NetBeacon Institute: Empowering a Safer Web – Source: www.darkreading.com
Source: www.darkreading.com – Author: PRESS RELEASE RESTON, Va., May 6, 2024 /PRNewswire/ — The DNS Abuse Institute, dedicated to combating online technical abuse and fostering a safer digital environment,...
AXA XL Introduces Endorsement to Help Public Companies Address SEC Cyber Reporting Costs – Source: www.darkreading.com
Source: www.darkreading.com – Author: PRESS RELEASE NEW YORK, May 6, 2024 /PRNewswire/ — AXA XL unveiled a new cyber insurance endorsement providing public companies with dedicated coverage to...
Microsoft Previews Feature to Block Malicious OAuth Apps – Source: www.darkreading.com
Source: www.darkreading.com – Author: Jeffrey Schwartz, Contributing Writer Source: Richard Levine via Alamy Stock Photo Threat actors are increasingly including malicious OAuth apps in their campaigns...
AT&T Splits Cybersecurity Services Business, Launches LevelBlue – Source: www.darkreading.com
Source: www.darkreading.com – Author: Robert Lemos, Contributing Writer Source: Mikko Lemola via Shutterstock AT&T has completed the divestiture of its cybersecurity services group and formed a...
The Psychological Underpinnings of Modern Hacking Techniques – Source: www.darkreading.com
Source: www.darkreading.com – Author: Tara Lemieux 4 Min Read Source: Brain light via Alamy Stock Photo COMMENTARY The landscape of cybersecurity is not just a battleground...
RSAC: Securing Foundational Tech Critical to Upholding Democratic Values, Says Blinken – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: 1 Written by US Secretary of State Antony Blinken explained the US government’s vision to secure foundational technologies for the benefit of...
RSAC: Threat Actors Weaponize Hacktivism for Financial Gain – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: 1 Hacktivism has become increasingly blurred with financial cybercrime and nation-state activities, with threat actors deliberately aligning with causes to facilitate their...
RSAC: Law Enforcement Takedowns Force Ransomware Affiliates to Diversify – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: 1 The recent wave of law enforcement operations against ransomware gangs led to short-term decreased ransomware payments and activities, forcing ransomware affiliates...
RSAC: 70% of Businesses Prioritize Innovation Over Security in Generative AI Projects – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: 1 Businesses are being left vulnerable to a range of cybersecurity and privacy risks as 70% of business executives prioritize innovation over...
What Palo Alto Networks and CrowdStrike Teach us About Using a Mobile Defense Platform – Source: www.cyberdefensemagazine.com
Source: www.cyberdefensemagazine.com – Author: News team By Tom Tovar, Co-creator and CEO of Appdome There’s a major battle brewing between platform vs. platformization companies in cybersecurity....
Organizational Cybersecurity Hinges on End-User Satisfaction – Source: www.cyberdefensemagazine.com
Source: www.cyberdefensemagazine.com – Author: News team The critical role end-user experience plays in organizational security By Amitabh Sinha, CEO and Co-Founder of Workspot In an era...
Why Your VPN May Not Be As Secure As It Claims – Source: krebsonsecurity.com
Source: krebsonsecurity.com – Author: BrianKrebs Virtual private networking (VPN) companies market their services as a way to prevent anyone from snooping on your Internet usage. But...
CISA says ‘no more’ to decades-old directory traversal bugs – Source: go.theregister.com
Source: go.theregister.com – Author: Team Register CISA is calling on the software industry to stamp out directory traversal vulnerabilities following recent high-profile exploits of the 20-year-old...
Germany points finger at Fancy Bear for widespread 2023 hacks, DDoS attacks – Source: go.theregister.com
Source: go.theregister.com – Author: Team Register infosec in brief It was just around a year ago that a spate of allegedly Russian-orchestrated cyberattacks hit government agencies...
Identity, Credential Misconfigurations Open Worrying Security Gaps – Source: securityboulevard.com
Source: securityboulevard.com – Author: Nathan Eddy Identity and credential misconfigurations pose a major security risk to organizations, with companies in energy, manufacturing and financial services particularly...