Source: www.infosecurity-magazine.com – Author: The UK’s National Cyber Security Centre (NCSC) and its US equivalent have urged Ivanti customers to take immediate action to mitigate two...
Month: January 2025
Green Bay Packers Pro Shop Data Breach Compromises Customers – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: The Green Bay Packers disclosed on Monday a data breach affecting their official online retail store, packersproshop.com, after discovering malicious code designed...
Darktrace to Acquire Incident Investigation Firm Cado Security – Source: www.securityweek.com
Source: www.securityweek.com – Author: Eduard Kovacs Darktrace on Thursday announced the “proposed acquisition” of UK-based incident investigation and response firm Cado Security. Financial terms have not...
Medical Billing Firm Medusind Says Data Breach Impacts 360,000 People – Source: www.securityweek.com
Source: www.securityweek.com – Author: Eduard Kovacs Florida-based medical and dental billing and revenue cycle management company Medusind has revealed that a data breach discovered in December...
GFI KerioControl Firewall Vulnerability Exploited in the Wild – Source: www.securityweek.com
Source: www.securityweek.com – Author: Ionut Arghire Threat actors are exploiting a recently disclosed GFI KerioControl firewall vulnerability that leads to one-click remote code execution (RCE), threat...
SonicWall Patches Authentication Bypass Vulnerabilities in Firewalls – Source: www.securityweek.com
Source: www.securityweek.com – Author: Ionut Arghire SonicWall this week announced patches for multiple vulnerabilities in its firewalls, including two high-severity flaws that could lead to authentication...
The ‘Worst in Show’ CES Products Put Your Data at Risk and Cause Waste, Privacy Advocates Say – Source: www.securityweek.com
Source: www.securityweek.com – Author: Associated Press So much of the technology showcased at CES includes gadgets made to improve consumers’ lives — whether by leveraging AI...
From Silos to Synergy: Transforming Threat Intelligence Sharing in 2025 – Source: www.securityweek.com
Source: www.securityweek.com – Author: Marc Solomon As we look ahead to the New Year and think about what we are going to prioritize from a security...
Palo Alto Networks Patches High-Severity Vulnerability in Retired Migration Tool – Source: www.securityweek.com
Source: www.securityweek.com – Author: Ionut Arghire Palo Alto Networks on Wednesday announced patches for multiple vulnerabilities in the Expedition migration tool, including a high-severity bug leading...
Excelsior Orthopaedics Data Breach Impacts 357,000 People – Source: www.securityweek.com
Source: www.securityweek.com – Author: Ionut Arghire Excelsior Orthopaedics is notifying approximately 357,000 people that their personal and health information was compromised in a data breach resulting...
United Nations aviation agency hacked, recruitment database plundered – Source: www.bitdefender.com
Source: www.bitdefender.com – Author: Graham Cluley The United Nations’ aviation agency has confirmed that hackers have compromised its systems, and accessed thousands of records stored in...
India Readies Overhauled National Data Privacy Rules – Source: www.darkreading.com
Source: www.darkreading.com – Author: Nate Nelson, Contributing Writer Source: Wavebreakmedia Ltd IFE-240405_3 via Alamy Stock Photo The government of India has drafted rules that will define...
Fed ‘Cyber Trust’ Label: Good Intentions That Fall Short – Source: www.darkreading.com
Source: www.darkreading.com – Author: Kristina Beek, Associate Editor, Dark Reading Source: Prisma by Dukas Presseagentur GmbH via Alamy Stock Photo Yesterday, the White House introduced a...
CrowdStrike Achieves FedRAMP Authorization for New Modules – Source: www.darkreading.com
Source: www.darkreading.com – Author: PRESS RELEASE AUSTIN, Texas – January 8, 2025 – CrowdStrike (Nasdaq: CRWD), today announced that the CrowdStrike Falcon® cybersecurity platform achieved Federal Risk and Authorization Management...
Trend Micro and Intel Innovate to Weed Out Covert Threats – Source: www.darkreading.com
Source: www.darkreading.com – Author: PRESS RELEASE DALLAS, Jan. 7, 2025 /PRNewswire/ — Trend Micro Incorporated (TYO: 4704; TSE: 4704), a global cybersecurity leader, today announced a new collaboration with Intel® (NASDAQ: INTC) designed...
Zivver Report Reveals Critical Challenges in Email Security for 2025 – Source: www.darkreading.com
Source: www.darkreading.com – Author: PRESS RELEASE 7th January 2025 – Zivver, a leader in secure communications, has published its latest report, shedding light on critical gaps in email security practices...
Palindrome Technologies Approved as Cybersecurity Label Administrator for FCC’s IoT Program – Source: www.darkreading.com
Source: www.darkreading.com – Author: PRESS RELEASE PRINCETON, N.J., Jan. 6, 2025 /PRNewswire/ — Palindrome Technologies has been conditionally approved as a Cybersecurity Label Administrator (CLA) for the Federal...
Green Bay Packers’ Online Pro Shop Sacked by Payment Skimmer – Source: www.darkreading.com
Source: www.darkreading.com – Author: Tara Seals, Managing Editor, News, Dark Reading Source: Cal Sport Media via Alamy Stock Photo Fans of the Green Bay Packers football...
New Docuseries Spotlights Hackers Who Shaped Cybersecurity – Source: www.darkreading.com
Source: www.darkreading.com – Author: Andrada Fiscutean Nathan Sportsman, the CEO of offensive security company Praetorian, had a grim epiphany in the summer of 2023: We’re beginning...
EAGERBEE Malware Detection: New Backdoor Variant Targets Internet Service Providers and State Bodies in the Middle East – Source: socprime.com
Source: socprime.com – Author: Daryna Olyniychuk Hot on the heels of the re-emergence of a more advanced NonEuclid RAT variant in the cyber threat arena, a...
US Treasury Department Sanctions Chinese Company Over Cyberattacks – Source: www.schneier.com
Source: www.schneier.com – Author: Bruce Schneier HomeBlog US Treasury Department Sanctions Chinese Company Over Cyberattacks From the Washington Post: The sanctions target Beijing Integrity Technology Group,...
What Makes You… You? A Philosophical Take on Non-Human Identity – Source: securityboulevard.com
Source: securityboulevard.com – Author: Victor Ronin I struggled to find widely adopted terminology to describe this. Let me call it the process global path for the...
DEF CON 32 – Student Engagement Doesn’t Have to Suck – Source: securityboulevard.com
Source: securityboulevard.com – Author: Marc Handelman Wednesday, January 8, 2025 Home » Security Bloggers Network » DEF CON 32 – Student Engagement Doesn’t Have to Suck...
Green Bay Packers Retail Site Hacked, Data of 8,500 Customers Exposed – Source: securityboulevard.com
Source: securityboulevard.com – Author: Jeffrey Burt As the Green Bay Packers gear up for their first-round NFL playoff game January 12, team executives are having to...
CVE-2025-0282: Ivanti Connect Secure Zero-Day Vulnerability Exploited In The Wild – Source: securityboulevard.com
Source: securityboulevard.com – Author: Satnam Narang Ivanti disclosed two vulnerabilities in its Connect Secure, Policy Secure and Neurons for ZTA gateway devices, including one flaw that...
Insecure Medical Devices — Illumina DNA Sequencer Illuminates Risks – Source: securityboulevard.com
Source: securityboulevard.com – Author: Richi Jennings Running an obsolete OS, on obsolete hardware, configured with obsolete settings. A widely used DNA sequencer contains several worrying vulnerabilities. The...
The OpenID Shared Signals Framework – Source: securityboulevard.com
Source: securityboulevard.com – Author: Enzoic A New Chapter for Immediate, Cross-Organizational Security In today’s hyper-connected society, personal accounts rarely remain confined to a single platform. Individuals often access...
Randall Munroe’s XKCD ‘Origami Black Hole’ – Source: securityboulevard.com
Source: securityboulevard.com – Author: Marc Handelman via the comic humor & dry wit of Randall Munroe, creator of XKCD Permalink *** This is a Security Bloggers...
Time for a new job—9 work-from-home scams and how to spot them – Source: securityboulevard.com
Source: securityboulevard.com – Author: Avast Blog Home » Security Bloggers Network » Time for a new job—9 work-from-home scams and how to spot them Navigating the...
DEF CON 32 – Preparing for the Future: A Discussion of Our Rapidly Evolving Threat Landscape – Source: securityboulevard.com
Source: securityboulevard.com – Author: Marc Handelman Wednesday, January 8, 2025 Home » Security Bloggers Network » DEF CON 32 – Preparing for the Future: A Discussion...






















