Source: www.csoonline.com – Author: Opinion 05 Feb 20255 mins Data and Information SecurityRetail IndustrySecurity Practices The Payment Card Industry Data Security Standard’s 4.0 requirements are designed...
Month: February 2025
New trojan hijacks Linux and IoT devices – Source: www.csoonline.com
Source: www.csoonline.com – Author: The trojan has been used in attacks since mid-November 2024 to infect and remotely control systems and exfiltrate data such as user...
AWS tightens default security on Redshift – Source: www.infoworld.com
Source: www.infoworld.com – Author: news Feb 04, 20255 mins Data and Information Security Public accessibility to data in the managed data warehouse service has been disabled....
Abandoned AWS S3 buckets open door to remote code execution, supply-chain compromises – Source: www.csoonline.com
Source: www.csoonline.com – Author: Attackers re-register abandoned AWS S3 buckets filled with malicious files that are executed by applications looking for these buckets. Code references to...
Cybersecurity M&A Roundup: 45 Deals Announced in January 2025 – Source: www.securityweek.com
Source: www.securityweek.com – Author: Eduard Kovacs Forty-five cybersecurity-related merger and acquisition (M&A) deals were announced in January 2025. SecurityWeek tracked more than 400 M&A deals in...
Riot Raises $30 Million for Employee Cybersecurity Solution – Source: www.securityweek.com
Source: www.securityweek.com – Author: Ionut Arghire Employee-focused cyber-protection startup Riot this week announced raising $30 million in a Series B funding round that brings the total...
Abandoned Amazon S3 Buckets Enabled Attacks Against Governments, Big Firms – Source: www.securityweek.com
Source: www.securityweek.com – Author: Eduard Kovacs Cybersecurity company WatchTowr has identified many abandoned Amazon S3 buckets that could have been leveraged by threat actors to deliver...
Russian Hackers Exploited 7-Zip Zero-Day Against Ukraine – Source: www.securityweek.com
Source: www.securityweek.com – Author: Ionut Arghire Russian threat groups have conducted cyberespionage campaigns against government entities in Ukraine exploiting a zero-day vulnerability in the 7-Zip archiver...
Chrome 133, Firefox 135 Patch High-Severity Vulnerabilities – Source: www.securityweek.com
Source: www.securityweek.com – Author: Ionut Arghire Google and Mozilla on Tuesday announced the rollout of updates for the Chrome and Firefox browsers that address multiple high-severity...
Webinar Today: Defenders on the Frontline – Incident Response and Threat Intel Under the Microscope – Source: www.securityweek.com
Source: www.securityweek.com – Author: SecurityWeek News SecurityWeek will host the second session of the CISO Forum 2025 Outlook webinar series on Tuesday, February 5th at 1PM...
CISA Issues Exploitation Warning for .NET Vulnerability – Source: www.securityweek.com
Source: www.securityweek.com – Author: Eduard Kovacs The US cybersecurity agency CISA on Tuesday added several flaws to its Known Exploited Vulnerabilities (KEV) catalog, including a .NET...
Zyxel Issues ‘No Patch’ Warning for Exploited Zero-Days – Source: www.securityweek.com
Source: www.securityweek.com – Author: Ionut Arghire Taiwanese networking equipment maker Zyxel on Tuesday advised that two exploited zero-days in multiple legacy DSL CPE products will not...
How to Add Fingerprint Authentication to Your Windows 11 Computer – Source: www.techrepublic.com
Source: www.techrepublic.com – Author: Luis Millares If you’ve recently purchased or received a Windows 11 computer, one of the first things I recommend you do is...
Sophos Acquires Secureworks for $859 Million – Source: www.techrepublic.com
Source: www.techrepublic.com – Author: Fiona Jackson Sophos has completed its $859 million acquisition of managed cyber security services provider Secureworks in an all-cash transaction. It now...
U.K. Announces ‘World-First’ Cyber Code of Practice for Companies Developing AI – Source: www.techrepublic.com
Source: www.techrepublic.com – Author: Fiona Jackson The U.K. government has introduced its “world-first” AI Cyber Code of Practice for companies developing AI systems. The voluntary framework...
The Top 5 Cloud Security Risks: How Hacker-Powered Security Can Help – Source:www.hackerone.com
Source: www.hackerone.com – Author: jkanevsky@hackerone.com. Widespread digital transformation means increased cloud security risk. Learn how human intelligence—hacker-powered security—can help your organization defend against new attack vectors,...
Investors, Trump and the Illuminati: What the “Nigerian prince” scams became in 2024 – Source: securelist.com
Source: securelist.com – Author: Anna Lazaricheva Spam and phishing Spam and phishing 05 Feb 2025 minute read “Nigerian” spam is a collective term for messages designed...
Take my money: OCR crypto stealers in Google Play and App Store – Source: securelist.com
Source: securelist.com – Author: Dmitry Kalinin, Sergey Puzan In March 2023, researchers at ESET discovered malware implants embedded into various messaging app mods. Some of these...
Credential Theft Becomes Cybercriminals’ Favorite Target – Source: www.darkreading.com
Source: www.darkreading.com – Author: Kristina Beek, Associate Editor, Dark Reading Source: Artur Marciniec via Alamy Stock Photo NEWS BRIEF After analyzing more than a million pieces...
Ferret Malware Added to ‘Contagious Interview’ Campaign – Source: www.darkreading.com
Source: www.darkreading.com – Author: Kristina Beek, Associate Editor, Dark Reading Source: imageBROKER.com GmbH & Co. KG via Alamy Stock Photo NEWS BRIEF In a new patch...
Cybercriminals Court Traitorous Insiders via Ransom Notes – Source: www.darkreading.com
Source: www.darkreading.com – Author: Kristina Beek, Associate Editor, Dark Reading Source: Mayam studio via Shutterstock Ransomware actors are utilizing a previously unseen tactic in their ransomware...
Chinese ‘Infrastructure Laundering’ Abuses AWS, Microsoft Cloud – Source: www.darkreading.com
Source: www.darkreading.com – Author: Elizabeth Montalbano, Contributing Writer Source: Aleksia via Alamy Stock Photo Researchers have linked the China-based Funnull content delivery network (CDN) to a...
Nigeria Touts Cyber Success, Even as Cybercrime Rises in Africa – Source: www.darkreading.com
Source: www.darkreading.com – Author: Robert Lemos, Contributing Writer Threat Index global mapSource: Check Point Software Technologies Nigeria’s government has taken a tougher stance against financial fraud...
Black Hat USA – Source: www.darkreading.com
Source: www.darkreading.com – Author: TechTarget and Informa Tech’s Digital Business Combine.TechTarget and Informa TechTarget and Informa Tech’s Digital Business Combine. Together, we power an unparalleled network...
Google: How to make any AMD Zen CPU always generate 4 as a random number – Source: go.theregister.com
Source: go.theregister.com – Author: Iain Thomson Googlers have not only figured out how to break AMD’s security – allowing them to load unofficial microcode into its...
Poisoned Go programming language package lay undetected for 3 years – Source: go.theregister.com
Source: go.theregister.com – Author: Connor Jones A security researcher says a backdoor masquerading as a legitimate Go programming language package used by thousands of organizations was...
Grubhub serves up security incident with a side of needing to change your password – Source: go.theregister.com
Source: go.theregister.com – Author: Connor Jones US food and grocery delivery platform Grubhub says a security incident at a third-party service provider is to blame after...
US accuses Canadian math prodigy of $65M crypto scheme – Source: go.theregister.com
Source: go.theregister.com – Author: Jude Karabus New York feds today unsealed a five-count criminal indictment charging a 22-year-old Canadian math prodigy with exploiting vulnerabilities in two...
International Day of Women and Girls in STEM Celebration
Join us on Feb. 11 for this free virtual event featuring Congresswoman Luz Rivas (D-CA 29th) and a panel of CEOs from nonprofit engineering organizations. Source...
Celebrate Black History Month With SWE
Browse through this compilation of some of our top blog posts, podcast episodes, magazine articles, and online courses highlighting Black women and STEM allies. Source Views:...