Source: go.theregister.com – Author: Iain Thomson Owners of Ivanti’s Connect Secure, Policy Secure, and ZTA Gateway products have a new strain of malware to fend off,...
Day: April 1, 2025
Top cybersecurity boffin, wife vanish as FBI raids homes – Source: go.theregister.com
Source: go.theregister.com – Author: Iain Thomson A tenured computer security professor at Indiana University and his university-employed wife have not been seen publicly since federal agents...
Oracle Cloud security SNAFU latest: IT giant accused of pedantry as evidence scrubbed – Source: go.theregister.com
Source: go.theregister.com – Author: Thomas Claburn Two Oracle data security breaches have been reported in the past week, and the database goliath not only remains reluctant...
Check Point confirms breach, but says it was ‘old’ data and crook made ‘false’ claims – Source: go.theregister.com
Source: go.theregister.com – Author: Connor Jones A digital burglar is claiming to have nabbed a trove of “highly sensitive” data from Check Point – something the...
The NHS Cybersecurity Challenge. Why Agent Fatigue Makes It Worse? – Source: heimdalsecurity.com
Source: heimdalsecurity.com – Author: Morten Kjaersgaard When I speak to NHS cybersecurity staff, one particular issue comes up time and again: technology fragmentation. IT staff at...
There are 10,000 reasons to doubt Oracle Cloud’s security breach denial – Source: go.theregister.com
Source: go.theregister.com – Author: Connor Jones Oracle Cloud’s denial of a digital break-in is now in clear dispute. A infosec researcher working on validating claims that...
Next-Gen Phishing Techniques – How Back-End Tech Made Scams More Effective – Source: heimdalsecurity.com
Source: heimdalsecurity.com – Author: Andrei Minca Phishing scams are no longer just poorly written emails full of typos. The era of messages from long-lost, wealthy relatives...
Qilin affiliates spear-phish MSP ScreenConnect admin, targeting customers downstream – Source: news.sophos.com
Source: news.sophos.com – Author: gallagherseanm Late in January 2025, a Managed Service Provider (MSP) administrator received a well-crafted phishing email containing what appeared to be an...
9 Best Endpoint Management Software in 2025 – Source: heimdalsecurity.com
Source: heimdalsecurity.com – Author: Livia Gyongyoși Keeping track of laptops, phones, and IoT devices can feel like herding cats, especially with remote work on the rise....
DORA Compliance for MSPs – How to Help Your Clients – Source: heimdalsecurity.com
Source: heimdalsecurity.com – Author: Livia Gyongyoși In January 2025, the European Union’s new Digital Operational Resilience Act (DORA) came into effect. If you’re an MSP and...
Best Automated Patch Management Software in 2025 – Source: heimdalsecurity.com
Source: heimdalsecurity.com – Author: Cristian Neagu Did you know? — Recent research shows that 80% of cyberattacks happen due to unpatched software vulnerabilities. This highlights the...
Heimdal and Interbel Partner to Secure Spanish Businesses Against Rising Cyber Threats – Source: heimdalsecurity.com
Source: heimdalsecurity.com – Author: Madalina Popovici BARCELONA, Spain, and COPENHAGEN, Denmark, January 20, 2025 — Heimdal, a leading cybersecurity company, has partnered with Interbel, a Spanish...
Cell Phone OPSEC for Border Crossings – Source: www.schneier.com
Source: www.schneier.com – Author: Bruce Schneier I have heard stories of more aggressive interrogation of electronic devices at US border crossings. I know a lot about...
Hacker Claims Breach of Check Point Cybersecurity Firm, Sells Access – Source:hackread.com
Source: hackread.com – Author: Waqas. A hacker operating under the alias “CoreInjection” is claiming responsibility for the breach of Israeli cybersecurity company Check Point, alleging access...
Celebrating Women in Engineering in the Arab World
For National Arab American Heritage Month, SWE recognizes some of the Arab women engineers making their mark in the industry. Source Views: 0
Guiding the Future: The SWE Section Election Manual
Explore this new resource that helps SWE Sections select future leaders. Source Views: 1
U.S. CISA adds Cisco Smart Licensing Utility flaw to its Known Exploited Vulnerabilities catalog – Source: securityaffairs.com
Source: securityaffairs.com – Author: Pierluigi Paganini U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds Cisco Smart Licensing Utility flaw to its Known Exploited Vulnerabilities catalog. The...
Russia-linked Gamaredon targets Ukraine with Remcos RAT – Source: securityaffairs.com
Source: securityaffairs.com – Author: Pierluigi Paganini Russia-linked Gamaredon targets Ukraine with a phishing campaign using troop-related lures to deploy the Remcos RAT via PowerShell downloader. Talos...
CoffeeLoader uses a GPU-based packer to evade detection – Source: securityaffairs.com
Source: securityaffairs.com – Author: Pierluigi Paganini CoffeeLoader is a sophisticated malware that uses numerous techniques to bypass security solutions, Zscaler ThreatLabz warns. Zscaler ThreatLabz discovered CoffeeLoader,...
Morphing Meerkat phishing kits exploit DNS MX records – Source: securityaffairs.com
Source: securityaffairs.com – Author: Pierluigi Paganini Morphing Meerkat phishing kits exploit DNS MX records to deliver spoofed login pages, targeting over 100 brands. Infoblox researchers discovered...
How Mechanical Engineer Michelle Johnston Returned to Work After a Career Break
After a 14-year career break, Michelle Johnston returned to the engineering workforce after meeting her employer at the WE22 Career Fair! Read her story and learn...
Engineering Careers in Hair Care: Meet Maxine Tomlinson
As a Senior Scientist in R&D at Henkel, Maxine shares her unique career journey and discusses career paths in the personal care industry for engineers. Source...
SWE Diverse Podcast Ep 227: Un Cafecito With a Woman in STEM: Dr. Justina Sanchez
Celebrate Hispanic Heritage Month with our new podcast interview with Dr. Justina Sanchez and Lennis Perez! Source Views: 0
Call for New SWE Affinity Groups for FY24
Learn how to propose a new Affinity Group and read more about our existing Affinity Groups. Source Views: 0
Mujeres Initiative: Building Latina Leaders
Read more about the Mujeres Initiative with Mariel Cisneros (she/her,) co-lead of the Latinos Affinity Group. Source Views: 0
What Does Being First-Gen Mean to Us?
Each month throughout the year, we’ll be spotlighting a SWE Affinity Group. We are excited to highlight SWE’s First-Generation Students and Professionals Affinity Group! Source Views:...
Threat Actors Deploy WordPress Malware in ‘mu-plugins’ Directory – Source: www.securityweek.com
Source: www.securityweek.com – Author: Ionut Arghire Malicious hackers have been caught hiding their WordPress malware in the ‘mu-plugins’ directory to evade routine security checks, according to...
Zero to Hero – A “Measured” Approach to Building a World-Class Offensive Security Program – Source: www.securityweek.com
Source: www.securityweek.com – Author: Trevin Edgeworth Measure twice, cut once. I’m sure this timeless mantra has not only been used, but proven frustratingly true on multiple...
Hacker Leaks Samsung Customer Data – Source: www.securityweek.com
Source: www.securityweek.com – Author: Ionut Arghire A threat actor has published approximately 270,000 customer records allegedly stolen from Samsung Germany’s ticketing system, cybersecurity firm Hudson Rock...
Part of EU’s New €1.3 Billion Investment Going to Cybersecurity – Source: www.securityweek.com
Source: www.securityweek.com – Author: Eduard Kovacs The European Commission announced on Friday that €1.3 billion ($1.4 billion) will be allocated for cybersecurity, artificial intelligence and digital...