Source: socprime.com – Author: Veronika Telychko Reaching Security Compliance Milestone for the Fourth Year in a Row We are excited to share that SOC Prime has...
Day: October 13, 2024
Sellafield nuclear site hit with £332,500 fine after “significant cybersecurity shortfalls” – Source: www.bitdefender.com
Source: www.bitdefender.com – Author: Graham Cluley The UK’s Sellafield nuclear waste processing and storage site has been fined £332,500 by regulators after its IT systems were...
Cybersecurity and compliance: The dynamic duo of 2024 – Source: grahamcluley.com
Source: grahamcluley.com – Author: Graham Cluley Graham Cluley Security News is sponsored this week by the folks at ManageEngine. Thanks to the great team there for...
Shrouded#Sleep Campaign Detection: North Korean Hackers Linked to the APT37 Group Use New VeilShell Malware Targeting Southeast Asia – Source: socprime.com
Source: socprime.com – Author: Veronika Telychko North Korea-affiliated APT groups have consistently ranked among the most active adversaries over the past decade. This year, security experts...
Tick tock.. Operation Cronos arrests more LockBit ransomware gang suspects – Source: www.tripwire.com
Source: www.tripwire.com – Author: Graham Cluley International law enforcement agencies have scored another victory against the LockBit gang, with a series of arrests and the seizure...
SOC Prime Threat Bounty Digest — September 2024 Results – Source: socprime.com
Source: socprime.com – Author: Alla Yurchenko Detection Content Creation, Submission & Release In September, the Threat Bounty Program experienced significant growth, with more submissions of detection...
Uncoder AI: A Guide on Contributing Detection Rules to SOC Prime Platform via Threat Bounty Program – Source: socprime.com
Source: socprime.com – Author: Hanna Korostelova Efficiency and collaboration are essential in cybersecurity. As part of the SOC Prime Platform, Uncoder AI is a a professional...
Smashing Security podcast #387: Breaches in your genes, and Kaspersky switcheroo raises a red flag – Source: grahamcluley.com
Source: grahamcluley.com – Author: Graham Cluley From family tree to jail cell? A hacker is alleged to have exploited information on genealogy websites to steal millions...
The AI Fix #18: ChatGPT’s false memories, and would an inner critic stop AI hallucinations? – Source: grahamcluley.com
Source: grahamcluley.com – Author: Graham Cluley Skip to content News and views from the world of artificial intelligence. In episode 18 of “The AI Fix” our...
Detecting CUPS Exploits: Critical Security Vulnerabilities in Linux and Unix Systems Allow Remote Code Execution – Source: socprime.com
Source: socprime.com – Author: Daryna Olyniychuk Another day, another challenge for cyber defenders. Recently, researchers revealed a series of critical security gaps in the OpenPrinting Common...
British man used genealogy websites to fuel alleged hacking and insider trading scheme – Source: www.bitdefender.com
Source: www.bitdefender.com – Author: Graham Cluley A London-based man is facing extradition to the United States after allegedly masterminding a scheme to hack public companies prior...
Gamaredon Attack Detection: Cyber-Espionage Operations Against Ukraine by the russia-linked APT – Source: socprime.com
Source: socprime.com – Author: Veronika Telychko The nefarious state-sponsored russia-aligned Gamaredon (aka Hive0051, UAC-0010, or Armageddon APT) has been launching a series of cyber-espionage campaigns against...
SnipBot Detection: A New RomCom Malware Variant Leverages a Custom Code Obfuscation Method and Sophisticated Evasion Techniques – Source: socprime.com
Source: socprime.com – Author: Daryna Olyniychuk A novel iteration of the RomCom malware family emerges in the cyber threat arena. The new malware, dubbed SnipBot, uses...
Vendor-Agnostic Cybersecurity: Adapting to the Future of Threat Detection – Source: socprime.com
Source: socprime.com – Author: Eugene Tkachenko In today’s fast-moving technological landscape, organizations face unprecedented challenges in managing their security operations. When both threats and technologies change...
NextGen Identity Management – Source: www.cyberdefensemagazine.com
Source: www.cyberdefensemagazine.com – Author: News team Federal agencies face a pivotal cybersecurity challenge: prevent unauthorized entities from accessing systems and facilities, while granting authorized federal employees...
US and UK govts warn: Russia scanning for your unpatched vulnerabilities – Source: go.theregister.com
Source: go.theregister.com – Author: Brandon Vigliarolo in brief If you need an excuse to improve your patching habits, a joint advisory from the US and UK...
Strengthening Security – Source: www.cyberdefensemagazine.com
Source: www.cyberdefensemagazine.com – Author: Stevin Integrated Governance, Risk, and Compliance Is Critical Business executives in all sectors place a high premium on security in the quickly...
How AI-Driven Cybersecurity Offers Both Promise and Peril for Enterprises – Source: www.cyberdefensemagazine.com
Source: www.cyberdefensemagazine.com – Author: News team Artificial Intelligence (AI) is transforming multiple sectors, driving innovation and enhancing productivity and cybersecurity. The AI market is projected to...
INC ransomware rebrands to Lynx – same code, new name, still up to no good – Source: go.theregister.com
Source: go.theregister.com – Author: Connor Jones Researchers at Palo Alto’s Unit 42 believe the INC ransomware crew is no more and recently rebranded itself as Lynx...
US lawmakers seek answers on alleged Salt Typhoon breach of telecom giants – Source: go.theregister.com
Source: go.theregister.com – Author: Jessica Lyons Lawmakers are demanding answers about earlier news reports that China’s Salt Typhoon cyberspies breached US telecommunications companies Verizon, AT&T, and...
Innovator Spotlight: Zendata – Source: www.cyberdefensemagazine.com
Source: www.cyberdefensemagazine.com – Author: Stevin In today’s digital landscape, data security and privacy have become top priorities for organizations of all sizes. According to a 2023...
Worried about Insider Risk? Pay More Attention to Offboarding – Source: www.cyberdefensemagazine.com
Source: www.cyberdefensemagazine.com – Author: News team Discussions of insider risk inevitably conjure images of disgruntled IT employees stealing sensitive data from the comfort of an air-conditioned...
RAC duo busted for stealing and selling crash victims’ data – Source: go.theregister.com
Source: go.theregister.com – Author: Paul Kunert Two former workers at roadside assistance provider RAC were this week given suspended sentences after illegally copying and selling tens...
Keir Starmer hands ex-Darktrace boss investment minister gig – Source: go.theregister.com
Source: go.theregister.com – Author: Connor Jones Keir Starmer’s decision to appoint Poppy Gustafsson as the UK’s new investment minister is being resoundingly praised despite the former...
FBI created a cryptocurrency so it could watch it being abused – Source: go.theregister.com
Source: go.theregister.com – Author: Simon Sharwood The FBI created its own cryptocurrency so it could watch suspected fraudsters use it – an idea that worked so...
Innovator Spotlight: Concentric AI – Source: www.cyberdefensemagazine.com
Source: www.cyberdefensemagazine.com – Author: Nick It’s not enough for companies to just discover and monitor sensitive data. They need tools that can proactively fix any security...
Unmasking Shadow Apps to Secure Your SaaS Stack – Source: www.cyberdefensemagazine.com
Source: www.cyberdefensemagazine.com – Author: News team It is a tale almost as old as time: users click download, install, and accept as they adopt new software...
Healthcare attacks spread beyond US – just ask India’s Star Health – Source: go.theregister.com
Source: go.theregister.com – Author: Laura Dobberstein Leading Indian health insurance provider Star Health has admitted to being the victim of a cyber attack after criminals claimed...
How Automation Can Help Security Policy Optimization – Source: www.cyberdefensemagazine.com
Source: www.cyberdefensemagazine.com – Author: News team One of the recurring questions we hear from network security leaders is “why aren’t our security policies optimized?” The answer,...
Crooks stole personal info of 77k Fidelity Investments customers – Source: go.theregister.com
Source: go.theregister.com – Author: Jessica Lyons Fidelity Investments has notified 77,099 people that their personal information was stolen in an August data breach. The mega asset...