Source: www.schneier.com – Author: Bruce Schneier About Bruce Schneier I am a public-interest technologist, working at the intersection of security, technology, and people. I’ve been writing...
Day: February 28, 2025
Third-Party Attacks Drive Major Financial Losses in 2024 – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: Third-party attacks emerged as a significant driver of material financial losses from cyber incidents in 2024, according to cyber risk management firm...
Cybersecurity M&A Roundup: SolarWinds Acquired for $4.4bn – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: Following a busy January, the cybersecurity M&A market remained active in February 2025, with several key mergers and acquisitions (M&As) announced. The...
Old Vulnerabilities Among the Most Widely Exploited – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: In their quest for network access, cyber threat actors are leveraging a broad spectrum of vulnerabilities, from the most recently disclosed to...
Prolific Data Extortion Actor Arrested in Thailand – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: Law enforcement have arrested one of the most notorious cybercriminals operating in the Asia-Pacific region. The joint operation was carried out by...
Top 10 Most Probable Ways a Company Can Be Hacked – Source: www.darkreading.com
Source: www.darkreading.com – Author: Erich Kron Please enable cookies. Sorry, you have been blocked You are unable to access darkreading.com Why have I been blocked? This...
Targeted by Ransomware, Middle East Banks Shore Up Security – Source: www.darkreading.com
Source: www.darkreading.com – Author: Robert Lemos, Contributing Writer Please enable cookies. Sorry, you have been blocked You are unable to access darkreading.com Why have I been...
Is your enterprise ‘cyber resilient’? Probably not. Here’s how other boards fixed that – Source: www.csoonline.com
Source: www.csoonline.com – Author: A strategy that’s been around for 20+ years but only now gaining traction ensures that when (not if) breaches occur, the impact...
Hacker verschlüsseln Daten von rund 12.000 Patienten – Source: www.csoonline.com
Source: www.csoonline.com – Author: Hacker haben sich Zugriff auf Daten von Tausenden Patienten aus Hamburg verschafft. Inactive design – Shutterstock.com Laut einem Bericht des Hamburger Abendblatt...
Interna von Ransomware-Gruppe Black Basta durchgesickert – Source: www.csoonline.com
Source: www.csoonline.com – Author: Die russische Ransomware-Bande ist seit Beginn des Jahres 2025 mehr mit sich selbst beschäftigt und verhält sich deshalb ruhig, so Experten. Über...
What is zero trust? The security model for a distributed and risky era – Source: www.csoonline.com
Source: www.csoonline.com – Author: A zero trust architecture locks down data and contains damages from breaches by taking a ‘never trust, always verify’ approach. What is...
Diese Unternehmen hat es schon erwischt – Source: www.csoonline.com
Source: www.csoonline.com – Author: Ransomware, Brute Force, DDoS und Co: Diese deutschen Unternehmen wurden bereits in diesem Jahr von Cyberkriminellen attackiert. Lesen Sie, welche Unternehmen in...
Security und GenAI – Zwischen Innovation und Sicherheit – Source: www.csoonline.com
Source: www.csoonline.com – Author: Cyberkriminelle nutzen KI zur Skalierung und Automatisierung von Angriffen, während Security-Teams auf KI-gestützte Erkennung, Prävention und Response setzen. Doch Experten konstatieren: Beide...
Schwachstellen managen: Die besten Vulnerability-Management-Tools – Source: www.csoonline.com
Source: www.csoonline.com – Author: Geht es um Vulnerability Management, gibt es für Unternehmen viele Wege zum Ziel. Wir zeigen Ihnen die innovativsten Tools, um Schwachstellen zu...
In Other News: Krispy Kreme Breach Cost, Pwn2Own Berlin, Disney Hack Story – Source: www.securityweek.com
Source: www.securityweek.com – Author: Eduard Kovacs SecurityWeek’s cybersecurity news roundup provides a concise compilation of noteworthy stories that might have slipped under the radar. We provide...
Ransomware Group Takes Credit for Lee Enterprises Attack – Source: www.securityweek.com
Source: www.securityweek.com – Author: Eduard Kovacs A ransomware gang has taken credit for the recent attack on Lee Enterprises, which caused disruptions at dozens of local...
Vo1d Botnet Evolves as It Ensnares 1.6 Million Android TV Boxes – Source: www.securityweek.com
Source: www.securityweek.com – Author: Eduard Kovacs Cybercriminals continue to enhance the capabilities of the botnet known as Vo1d, which has grown significantly over the past half...
Microsoft Names Suspects in Lawsuit Against AI Hackers – Source: www.securityweek.com
Source: www.securityweek.com – Author: Eduard Kovacs As part of a lawsuit targeting cybercriminals who abuse AI services, Microsoft has made public the names of four individuals...
26 New Threat Groups Spotted in 2024: CrowdStrike – Source: www.securityweek.com
Source: www.securityweek.com – Author: Eduard Kovacs CrowdStrike this week published its 2025 Global Threat Report, which summarizes the latest adversary tactics and techniques, as well as important...
Hacker Behind Over 90 Data Leaks Arrested in Thailand – Source: www.securityweek.com
Source: www.securityweek.com – Author: Eduard Kovacs A 39-year-old Singaporean man accused of being a hacker responsible for over 90 data leaks has been arrested in Thailand. ...
The SOC files: Chasing the web shell – Source: securelist.com
Source: securelist.com – Author: Domenico Caldarella Web shells have evolved far beyond their original purpose of basic remote command execution, and many now function more like...
Warning issued as hackers offer firms fake cybersecurity audits to break into their systems – Source: www.tripwire.com
Source: www.tripwire.com – Author: Graham Cluley Companies are being warned that malicious hackers are using a novel technique to break into businesses – by pretending to...
Microsoft names alleged credential-snatching ‘Azure Abuse Enterprise’ operators – Source: go.theregister.com
Source: go.theregister.com – Author: Jessica Lyons Microsoft has named four of the ten people it is suing for allegedly snatching Azure cloud credentials and developing tools...
Feds: Army soldier suspected of AT&T heist Googled ‘can hacking be treason,’ ‘defecting to Russia’ – Source: go.theregister.com
Source: go.theregister.com – Author: Jessica Lyons The US Army soldier suspected of compromising AT&T and bragging about getting his hands on President Trump’s call logs allegedly...
FBI officially fingers North Korea for $1.5B Bybit crypto-burglary – Source: go.theregister.com
Source: go.theregister.com – Author: Iain Thomson The FBI has officially accused North Korea’s Lazarus Group of stealing $1.5 billion in Ethereum from crypto-exchange Bybit earlier this...
Celebrate Women’s History Month With SWE
View some of our Women’s History Month resources from 2024, including some of our magazine features and blog posts, and tune in to a few episodes...
5 Steps to Improve Psychological Safety in a Virtual Team
Theresa Sigillito Hollema (she/her) shares a real-world case study of how an international team improved its psychological safety. Plus, join her upcoming free live event, “Managing...
SWE Diverse Podcast Ep 253: How Two Trailblazers Cleared the Path for Today’s Women Engineers
Hear the stories of Nora Stanton Blatch Barney and Elsie Eaves and learn how their experiences connect to today’s women engineers on this episode of Diverse:...
Global Women Engineers AG Leaders Mark International Day for Women and Girls in Science
Learn more about the session featuring Affinity Group leaders Ophelia Fernandes and Abosede Adewole. Source Views: 0
Living Without Limits With Linda Thomas, F. SWE
Linda Thomas, F.SWE, reflects on her career journey in this interview with Hang Loi Source Views: 0