Source: www.csoonline.com – Author: News 27 März 20252 Minuten CyberangriffeDatenschutzverletzungen Im Internet kursieren derzeit Hinweise auf einen umfangreichen Cyberangriff bei Oracle. Doch der IT-Anbieter bestreitet den...
Month: March 2025
CoffeeLoader Detection: A New Sophisticated Malware Family Spread via SmokeLoader – Source: socprime.com
Source: socprime.com – Author: Veronika Telychko Defenders have observed CoffeeLoader, a new stealthy malware that evades security protection using advanced evasion techniques and takes advantage of...
Cardiff’s children’s chief confirms data leak 2 months after cyber risk was ‘escalated’ – Source: go.theregister.com
Source: go.theregister.com – Author: Connor Jones Cardiff City Council’s director of children’s services says data was leaked or stolen from the organization, although she did not...
After Chrome patches zero-day used to target Russians, Firefox splats similar bug – Source: go.theregister.com
Source: go.theregister.com – Author: Iain Thomson Google pushed out an emergency patch for Chrome on Windows this week to stop attackers exploiting a sandbox-breaking zero-day vulnerability,...
Cyber-crew claims it cracked American cableco, releases terrible music video to prove it – Source: go.theregister.com
Source: go.theregister.com – Author: Iain Thomson A cyber-crime ring calling itself Arkana has made a cringe music video to boast of an alleged theft of subscriber...
China’s FamousSparrow flies back into action, breaches US org after years off the radar – Source: go.theregister.com
Source: go.theregister.com – Author: Jessica Lyons The China-aligned FamousSparrow crew has resurfaced after a long period of presumed inactivity, compromising a US financial-sector trade group and...
News alert: INE receives a dozen G2 badges highlighting its cybersecurity training leadership – Source: www.lastwatchdog.com
Source: www.lastwatchdog.com – Author: cybernewswire Cary, NC, Mar. 27, 2025, CyberNewswire — INE, a global leader in networking and cybersecurity training and certifications, is proud to...
VanHelsing ransomware: what you need to know – Source: www.tripwire.com
Source: www.tripwire.com – Author: Graham Cluley What is the VanHelsing ransomware? First reported earlier in March 2025, VanHelsing is a new ransomware-as-a-service operation. Oh, so it’s...
Iran’s MOIS-Linked APT34 Spies on Allies Iraq & Yemen – Source: www.darkreading.com
Source: www.darkreading.com – Author: Nate Nelson, Contributing Writer Please enable cookies. Sorry, you have been blocked You are unable to access darkreading.com Why have I been...
Hoff’s Rule: People First – Source: www.darkreading.com
Source: www.darkreading.com – Author: Dark Reading Staff Please enable cookies. Sorry, you have been blocked You are unable to access darkreading.com Why have I been blocked?...
How CISA Cuts Impact Election Security – Source: www.darkreading.com
Source: www.darkreading.com – Author: Alexander Culafi, Senior News Writer, Dark Reading Please enable cookies. Sorry, you have been blocked You are unable to access darkreading.com Why...
OpenAI Bumps Up Bug Bounty Reward to $100K in Security Update – Source: www.darkreading.com
Source: www.darkreading.com – Author: Kristina Beek, Associate Editor, Dark Reading Please enable cookies. Sorry, you have been blocked You are unable to access darkreading.com Why have...
Best Laptop for Cybersecurity: Top Picks for Ethical Hackers & Security Professionals – Source: www.cyberdefensemagazine.com
Source: www.cyberdefensemagazine.com – Author: News team Selecting the right Laptop For Cybersecurity is one of the most critical decisions for cybersecurity professionals. Whether you are a CISO, penetration...
Splunk Patches Dozens of Vulnerabilities – Source: www.securityweek.com
Source: www.securityweek.com – Author: Ionut Arghire Splunk on Wednesday announced patches for dozens of vulnerabilities across its products, including two high-severity flaws in Splunk Enterprise and...
Russian Espionage Group Using Ransomware in Attacks – Source: www.securityweek.com
Source: www.securityweek.com – Author: Ionut Arghire A Russian-speaking threat actor tracked as RedCurl has been observed deploying ransomware in a recent campaign, cybersecurity firm Bitdefender reports....
UK Software Firm Fined £3 Million Over Ransomware-Caused Data Breach – Source: www.securityweek.com
Source: www.securityweek.com – Author: Eduard Kovacs British software and IT services provider Advanced Computer Software Group has been fined £3 million ($3.8 million) by the UK...
The Importance of Allyship for Women in Cyber – Source: www.securityweek.com
Source: www.securityweek.com – Author: Marc Solomon Companies with structured mentoring programs are estimated to have a retention rate of 72% for mentees, compared to 49% for...
GetReal Security Raises $17.5 Million to Tackle Gen-AI Threats – Source: www.securityweek.com
Source: www.securityweek.com – Author: Ionut Arghire Cybersecurity startup GetReal Security on Wednesday announced raising $17.5 million in Series A funding, less than a year after emerging...
Defense Contractor MORSE to Pay $4.6M to Settle Cybersecurity Failure Allegations – Source: www.securityweek.com
Source: www.securityweek.com – Author: Eduard Kovacs Cambridge, Massachusetts-based defense contractor MORSE Corp has agreed to pay $4.6 million to settle allegations regarding its failure to comply...
Ransomware Groups Increasingly Adopting EDR Killer Tools – Source: www.securityweek.com
Source: www.securityweek.com – Author: Ionut Arghire Tools designed to disable endpoint detection and response (EDR) solutions are making their way to the arsenal of more and...
T-Mobile Coughed Up $33 Million in SIM Swap Lawsuit – Source: www.securityweek.com
Source: www.securityweek.com – Author: Ionut Arghire California law firm Greenberg Glusker says it secured a $33 million arbitration award against T-Mobile over the wireless carrier’s mishaps...
SWE Nairobi Mentorship Program Reaches Over 100 Collegiates
Learn about this innovative mentoring program by SWE Nairobi that highlighted soft skills, technical skills, and career paths in engineering to prepare collegians for the future....
Quick Tips to Use the SWE Brand
Learn how to use the Society of Women Engineers (SWE) brand and messaging correctly in this overview from the SWE Integrated Marketing Advisory Board (IMAB). Source...
Indigenous Peoples AG Spotlight: Global Indigenous Peoples
Each month throughout the year, we’ll be spotlighting a SWE Affinity Group. We are excited to highlight SWE’s Indigenous Peoples Affinity Group! Source Views: 0
Meet SWE’s Integrated Marketing Advisory Board (IMAB)
Wondering if your logo is compliant with SWE’s brand guidelines? Interested in engaging more effectively on social media? Learn about this resource that helps the SWE...
SWE Magazine Receives Top Honors in APEX, FOLIO Competitions
The award-winning SWE Magazine earned recognition in podcasting, writing, design, full issues, and more categories during the FY23 publication cycle. Source Views: 0
Championing Diversity and Equity in STEM
Dr. Joyce Yen believes that everyone in STEM should have the opportunity to be who they want to be. Source Views: 0
SWE Diverse Podcast Ep 234: Executive Leadership Training for Engineers: SWE’s eXXec Program
In this episode of Diverse: a Society of Women Engineers podcast, learn about the eXXec program and how it has helped these women in engineering develop...
Global Affiliate Spotlight: SWE Wuxi in China
Get to know the first professional SWE Global Affiliate in China and their latest accomplishments. Source Views: 1
What metrics should be tracked to ensure NHI compliance? – Source: securityboulevard.com
Source: securityboulevard.com – Author: Amy Cohn How Crucial are Non-Human Identities Compliance Metrics? Could you imagine navigating an unknown city without a map? The same goes...