Source: www.securityweek.com – Author: SecurityWeek News In a signal move for the cybersecurity sector, identity and access management (IAM) vendor SailPoint has made its return to...
Month: February 2025
Virginia Attorney General’s Office Struck by Cyberattack Targeting Attorneys’ Computer Systems – Source: www.securityweek.com
Source: www.securityweek.com – Author: Associated Press The Virginia Attorney General’s office, the state’s top prosecutorial agency led by Jason Miyares, was struck by a cyberattack this...
Sean Cairncross is Trump Nominee for National Cyber Director – Source: www.securityweek.com
Source: www.securityweek.com – Author: Ryan Naraine The Trump administration has nominated Sean Cairncross for National Cyber Director, a role that would see him succeed Harry Coker...
Rising Tides: Lesley Carhart on Bridging Enterprise Security and OT—and Improving the Human Condition – Source: www.securityweek.com
Source: www.securityweek.com – Author: Jennifer Leggio Rising Tides – A conversation with Lesley Carhart, Technical Director of Incident Response at Dragos One of the greatest realities...
Meta Paid Out Over $2.3 Million in Bug Bounties in 2024 – Source: www.securityweek.com
Source: www.securityweek.com – Author: Ionut Arghire Facebook parent company Meta says it handed out more than $2.3 million in rewards to security researchers as part of...
In Other News: $10,000 YouTube Flaw, Cybereason CEO Sues Investors, New OT Security Tool – Source: www.securityweek.com
Source: www.securityweek.com – Author: SecurityWeek News SecurityWeek’s cybersecurity news roundup provides a concise compilation of noteworthy stories that might have slipped under the radar. We provide...
SonicWall Firewall Vulnerability Exploited After PoC Publication – Source: www.securityweek.com
Source: www.securityweek.com – Author: Ionut Arghire Threat actors started exploiting a recent SonicWall firewall vulnerability this week, shortly after proof-of-concept (PoC) code targeting it was published,...
Salt Typhoon Targeting Old Cisco Vulnerabilities in Fresh Telecom Hacks – Source: www.securityweek.com
Source: www.securityweek.com – Author: Ionut Arghire The Chinese state-sponsored APT actor known as Salt Typhoon has been observed exploiting two known vulnerabilities in Cisco devices in...
Hacker Q&A with Alyssa: We are all still learning – Source:www.hackerone.com
Source: www.hackerone.com – Author: luke. At 16 Alyssa Herrera discovered BugBounties and HackerOne–she hasn’t looked back since. Now a full time bug hunter, Alyssa makes sure...
Palo Alto Networks firewall bug being exploited by threat actors: Report – Source: www.networkworld.com
Source: www.networkworld.com – Author: News Feb 14, 20253 mins FirewallsVulnerabilitiesZero-day vulnerability PAN admins urged to block open internet access to firewall management interfaces after discovery of...
Hacker attackieren Bundeswehr-Universität – Source: www.csoonline.com
Source: www.csoonline.com – Author: Cyberkriminelle haben sensible Informationen aus einem Rechenzentrum der Universität der Bundeswehr gestohlen. Wer dahinter steckt, ist noch nicht bekannt. Die Studierenden an...
whoAMI name confusion attacks can expose AWS accounts to malicious code execution – Source: www.csoonline.com
Source: www.csoonline.com – Author: Due to a misconfiguration, developers could be tricked into retrieving malicious Amazon Machine Images (AMI) while creating EC2 instances. Thousands of active...
Razzia gegen Telefonbetrüger – Source: www.csoonline.com
Source: www.csoonline.com – Author: Als falsche Polizeibeamte setzen sie ihre Opfer unter Druck oder locken mit Gewinnversprechen: Ermittler zerschlagen die Infrastruktur von Telefonbetrügern. Es gibt Durchsuchungen...
What is anomaly detection? Behavior-based analysis for cyber threats – Source: www.csoonline.com
Source: www.csoonline.com – Author: Anomaly detection can be powerful in spotting cyber incidents, but experts say CISOs should balance traditional signature-based detection with more bespoke methods...
Die besten IAM-Tools – Source: www.csoonline.com
Source: www.csoonline.com – Author: Diese Identity-und-Access-Management-Tools schützen Ihre Unternehmens-Assets auf dem Weg in die Zero-Trust-Zukunft. Identity & Access Management ist für sicherheitsbewusste Unternehmen im Zero-Trust-Zeitalter Pflicht....
PostgreSQL patches SQLi vulnerability likely exploited in BeyondTrust attacks – Source: www.csoonline.com
Source: www.csoonline.com – Author: News Analysis 13 Feb 20255 mins Data and Information SecurityVulnerabilitiesZero-day vulnerability Rapid7 researchers believe the BeyondTrust Remote Support attacks from December also...
Cybercriminals Use Go Resty and Node Fetch in 13 Million Password Spraying Attempts – Source: www.proofpoint.com
Source: www.proofpoint.com – Author: Feb 05, 2025Ravie LakshmananCybersecurity / Cloud Security Cybercriminals are increasingly leveraging legitimate HTTP client tools to facilitate account takeover (ATO) attacks on...
Proofpoint Leaders Named CRN Channel Chiefs 2025 – Source: www.proofpoint.com
Source: www.proofpoint.com – Author: Here are the executives who develop channel strategies that make partners successful. Here’s Where 20 Channel Chiefs Want Partners To Invest In...
Phishing tax scams increase as tax deadlines approach – Source: www.proofpoint.com
Source: www.proofpoint.com – Author: Kelly Sikkema via Unsplash Research from Proofpoint shows an increase in malicious domains and campaigns impersonating tax agencies and financial institutions, correlating...
Critical PostgreSQL bug tied to zero-day attack on US Treasury – Source: go.theregister.com
Source: go.theregister.com – Author: Connor Jones A high-severity SQL injection bug in the PostgreSQL interactive tool was exploited alongside the zero-day used to break into the...
2 charged over alleged New IRA terrorism activity linked to cops’ spilled data – Source: go.theregister.com
Source: go.theregister.com – Author: Connor Jones Two suspected New IRA members were arrested on Tuesday and charged under the Terrorism Act 2000 after they were found...
Watchdog ponders why Apple doesn’t apply its strict app tracking rules to itself – Source: go.theregister.com
Source: go.theregister.com – Author: Jude Karabus Apple is feeling the heat over its acclaimed iPhone privacy policy after a German regulator’s review of iOS tracking consent...
Chinese spies suspected of ‘moonlighting’ as tawdry ransomware crooks – Source: go.theregister.com
Source: go.theregister.com – Author: Jessica Lyons A crew identified as a Chinese government-backed espionage group appears to have started moonlighting as a ransomware player – further...
More victims of China’s Salt Typhoon crew emerge: Telcos just now hit via Cisco bugs – Source: go.theregister.com
Source: go.theregister.com – Author: Jessica Lyons China’s Salt Typhoon spy crew exploited vulnerabilities in Cisco devices to compromise at least seven devices linked to global telecom...
Have I Been Pwned likely to ban resellers from buying subs, citing ‘sh*tty behavior’ and onerous support requests – Source: go.theregister.com
Source: go.theregister.com – Author: Simon Sharwood Troy Hunt, proprietor of data breach lookup site Have I Been Pwned, is likely to ban resellers from the service....
Roundtable: Is DOGE Flouting Cybersecurity for US Data? – Source: www.darkreading.com
Source: www.darkreading.com – Author: Becky Bracken, Senior Editor, Dark Reading Source: Backyard Productions via Alamy Stock Photo Elon Musk and his band of programmers have been...
Chinese APT ‘Emperor Dragonfly’ Moonlights With Ransomware – Source: www.darkreading.com
Source: www.darkreading.com – Author: Kristina Beek, Associate Editor, Dark Reading Source: KB Photodesign via Shutterstock NEWS BRIEF A recent RA World ransomware attack utilized a tool...
Publishers Spotlight: Flashpoint – Source: www.cyberdefensemagazine.com
Source: www.cyberdefensemagazine.com – Author: Gary In 2024, a new hybrid cold war is redefining the threat landscape. Cyber, physical, and geopolitical risks are converging, with nation-states,...
RASP (Runtime Application Self-Protection) in Mobile Application Security: A Strategic Imperative for the Modern Threat Landscape – Source: www.cyberdefensemagazine.com
Source: www.cyberdefensemagazine.com – Author: News team Introduction The mobile application landscape is more dynamic and challenging than ever, with businesses increasingly relying on mobile channels to...
US charges two Russian men in connection with Phobos ransomware operation – Source: www.bitdefender.com
Source: www.bitdefender.com – Author: Graham Cluley The US Department of Justice (DOJ) has unsealed criminal charges against two Russian nationals, alleged to have operated a cybercrime...