Source: www.securityweek.com – Author: Ionut Arghire Energy sector contractor ENGlobal Corporation has confirmed that personal information was compromised during a November 2024 ransomware attack. The incident...
Month: January 2025
SonicWall Confirms Exploitation of New SMA Zero-Day – Source: www.securityweek.com
Source: www.securityweek.com – Author: Eduard Kovacs SonicWall has confirmed that a recently discovered vulnerability affecting its Secure Mobile Access (SMA) 1000 series products has been exploited...
A Tumultuous Week for Federal Cybersecurity Efforts – Source: krebsonsecurity.com
Source: krebsonsecurity.com – Author: BrianKrebs Image: Shutterstock. Greg Meland. President Trump last week issued a flurry of executive orders that upended a number of government initiatives...
Why Cybersecurity Compliance in Rail Transportation Has Never Been More Important, Or More Challenging to Keep on Track – Source: www.cyberdefensemagazine.com
Source: www.cyberdefensemagazine.com – Author: News team As the world’s Rail transportation industry becomes more sophisticated, embracing digital technologies to enhance efficiency, safety, and operational capabilities, it...
Why Cybersecurity At The Olympics (And All Major Global Events) Shouldn’t Take A Backseat – Source: www.cyberdefensemagazine.com
Source: www.cyberdefensemagazine.com – Author: News team Although the 2024 Summer Olympics brought more than 15 million visitors to Paris and generated $11 billion in economic activity,...
58% of Ransomware Victims Forced to Shut Down Operations – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: Over half (58%) of organizations hit by ransomware in 2024 were forced to shut down operations in order to recover, according to...
API Supply Chain Attacks Put Millions of Airline Users at Risk – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: A recently discovered vulnerability in a popular online travel service has put millions of airline users worldwide at risk of account takeover....
Mega Data Breaches Push US Victim Count to 1.7 Billion – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: A near-record number of data compromises in 2024 resulted in over 1.7 billion US breach victims, according to the Identity Theft Resource...
EU Sanctions Three Russians For 2020 Cyber-Attack on Estonia – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: Three Russian nationals have been sanctioned by the EU for their involvement in a 2020 cyber espionage operation targeting Estonian government agencies....
iPhone users targeted in Apple’s first zero-day exploit in 2025 – Source: www.csoonline.com
Source: www.csoonline.com – Author: The use-after-free flaw allows privilege escalation in affected media applications running on Apple’s Core Media framework. Apple iPhone users were targeted for...
DeepSeek hit by cyberattack and outage amid breakthrough success – Source: www.csoonline.com
Source: www.csoonline.com – Author: Some remain unconvinced that a cyberattack is to blame, noting that DeepSeek’s claims of low cost and efficiency remain unverified. Chinese AI...
US takes aim at healthcare cybersecurity with proposed HIPAA changes – Source: www.csoonline.com
Source: www.csoonline.com – Author: News Analysis 28 Jan 20258 mins HIPAAHealthcare IndustryRegulation Security experts welcome proposed changes to the regulation’s security rules while warning about political...
The cybersecurity skills gap reality: We need to face the challenge of emerging tech – Source: www.csoonline.com
Source: www.csoonline.com – Author: Opinion 28 Jan 20254 mins CSO and CISOHuman ResourcesIT Skills New research indicates an acute need for security professionals proficient with emerging...
New ransomware group Funksec is quickly gaining traction – Source: www.csoonline.com
Source: www.csoonline.com – Author: News 27 Jan 20255 mins Hacker GroupsHackingRansomware The rise of Funksec’s ransomware, which focuses on extortion through file encryption and data theft,...
News alert: INE Security announces new initiative to help companies accelerate CMMC 2.0 compliance – Source: www.lastwatchdog.com
Source: www.lastwatchdog.com – Author: cybernewswire Cary, NC, Jan. 26, 2025, CyberNewswire — INE Security, a leading global provider of cybersecurity training and certifications, today announced a new...
New VPN Backdoor – Source: www.schneier.com
Source: www.schneier.com – Author: Bruce Schneier A newly discovered VPN backdoor uses some interesting tactics to avoid detection: When threat actors use backdoor malware to gain...
1Password Review: Features, Pricing & Security – Source: www.techrepublic.com
Source: www.techrepublic.com – Author: Luis Millares 1Password fast facts Our rating: 4.3 stars out of 5 Pricing: Starts at $2.99 per month Key features Unique travel...
For $50, Cyberattackers Can Use GhostGPT to Write Malicious Code – Source: www.darkreading.com
Source: www.darkreading.com – Author: Jai Vijayan, Contributing Writer Source: Owlie Productions via Shutterstock A recently debuted AI chatbot dubbed GhostGPT has given aspiring and active cybercriminals...
Apple Patches Actively Exploited Zero-Day Vulnerability – Source: www.darkreading.com
Source: www.darkreading.com – Author: Kristina Beek, Associate Editor, Dark Reading Source: Shahid Jamil via Alamy Stock Photo NEWS BRIEF In its latest security update for users,...
IT-Harvest Launches HarvestIQ.ai – Source: www.darkreading.com
Source: www.darkreading.com – Author: PRESS RELEASE BIRMINGHAM, Mich., Jan. 15, 2025 /PRNewswire/ — IT-Harvest, the premier data-driven industry analyst firm, is excited to announce the launch of HarvestIQ.ai, a...
Spectral Capital Files Quantum Cybersecurity Patent – Source: www.darkreading.com
Source: www.darkreading.com – Author: PRESS RELEASE SEATTLE, Jan. 15, 2025 /PRNewswire/ — Spectral Capital Corporation (OTCQB: FCCN), a pioneer in providing its deep quantum technology platform, is pleased to...
Change Healthcare Breach Impact Doubles to 190M People – Source: www.darkreading.com
Source: www.darkreading.com – Author: Nate Nelson, Contributing Writer Source: Pavel Kapish via Alamy Stock Photo New evidence suggests that more than half of the US population...
USPS Impersonators Tap Trust in PDFs in Smishing Attack Wave – Source: www.darkreading.com
Source: www.darkreading.com – Author: Elizabeth Montalbano, Contributing Writer Source: Francis Vachon via Alamy Stock Photo Attackers impersonating the US Postal Service (USPS) are striking again, this...
Crisis Simulations: A Top 2025 Concern for CISOs – Source: www.darkreading.com
Source: www.darkreading.com – Author: Kristina Beek, Associate Editor, Dark Reading Source: Irina Guzovataya via Alamy Stock Photo NEWS BRIEF In 2025, chief information security officers (CISOs)...
The Case for Proactive, Scalable Data Protection – Source: www.darkreading.com
Source: www.darkreading.com – Author: Tom Ferrucci Tom Ferrucci, Chief Information Officer, Natco Home Group January 27, 2025 4 Min Read Source: MR3D via Alamy Stock Photo...
U.S. Shuts Down Another N. Korean IT Worker Scam, Indicting 5 – Source: securityboulevard.com
Source: securityboulevard.com – Author: Jeffrey Burt The Justice Department indicted five people connected to a North Korean IT worker scam who prosecutors said stole more than...
BTS #44 – Network Appliances: A Growing Concern – Source: securityboulevard.com
Source: securityboulevard.com – Author: Chris Garland In this episode, Paul Asadoorian and Chase Snyder discuss the latest security threats and vulnerabilities affecting network appliances, particularly focusing...
AI-Enhanced Attacks Accelerate the Need for Hybrid, Multi-Cloud Network Security and Observability – Source: securityboulevard.com
Source: securityboulevard.com – Author: Martin Roesch AI-Enhanced Attacks Accelerate the Need for Hybrid, Multi-Cloud Network Security and Observability by Martin Roesch Gartner forecasts generative AI will...
DEF CON 32 – Simulating Attacks Against Hydroelectric Power Plants – Source: securityboulevard.com
Source: securityboulevard.com – Author: Marc Handelman Home » Security Bloggers Network » DEF CON 32 – Simulating Attacks Against Hydroelectric Power Plants Author/Presenter: Julia Dewitz-Würzelberger Our...
Hackers Use Malicious PDFs, pose as USPS in Mobile Phishing Scam – Source: securityboulevard.com
Source: securityboulevard.com – Author: Jeffrey Burt An expansive phishing campaign aimed at mobile devices takes advantage of users’ trust of PDF files and the U.S. Postal...























