Source: www.darkreading.com – Author: Lily Yeoh Source: Piotr Adamowicz via Alamy Stock Photo COMMENTARY A new era of litigation is threatening the cybersecurity community. In just the...
Author: CISO2CISO Editor 2
White House Urges Switching to Memory Safe Languages – Source: www.darkreading.com
Source: www.darkreading.com – Author: Edge Editors Source: caia_image via Alamy Stock Photo The Office of the National Cyber Director’s latest technical report urged developers to shift...
LockBit’s Leak Site Reemerges, a Week After ‘Complete Compromise’ – Source: www.darkreading.com
Source: www.darkreading.com – Author: Nate Nelson, Contributing Writer Source: Axel Jass via Alamy Stock Photo The LockBit ransomware-as-a-service (RaaS) operation has re-launched its leak site, just...
Fortress Information Security Deploys Automated Patch Notification and Authenticity Tool – Source: www.darkreading.com
Source: www.darkreading.com – Author: PRESS RELEASE ORLANDO, Fla., Feb. 23, 2024 /PRNewswire/ — The Cybersecurity and Infrastructure Security Agency (CISA), the National Security Agency (NSA), and the Federal...
Pentera Launches Global Partner Program to Accelerate Growing Channel – Source: www.darkreading.com
Source: www.darkreading.com – Author: PRESS RELEASE Boston, February 22, 2024 – Pentera, the leader in Automated Security Validation, today announced the launch of its new Partner Program. The...
Hack The Box Launches Certified Web Exploitation Expert As Demand for Risk Mitigation Grows – Source: www.darkreading.com
Source: www.darkreading.com – Author: PRESS RELEASE Hack The Box (HTB), the leading gamified cybersecurity upskilling, certification, and talent assessment platform, has launched its latest hands-on certification offering,...
Delinea to Acquire Fastpath to Revolutionize Privileged Access and Identity Governance – Source: www.darkreading.com
Source: www.darkreading.com – Author: PRESS RELEASE SAN FRANCISCO, Feb. 21, 2024 /PRNewswire/ — Delinea, a leading provider of solutions that seamlessly extend Privileged Access Management (PAM), today announced a...
Optiv Accepting Applications for $10K Scholarship – Source: www.darkreading.com
Source: www.darkreading.com – Author: PRESS RELEASE DENVER, Feb. 21, 2024 /PRNewswire/ — Optiv, the cyber advisory and solutions leader, is accepting applications for its annual $10,000 scholarship for Black, African American...
LabHost cybercrime service lets anyone phish Canadian bank users – Source: www.bleepingcomputer.com
Source: www.bleepingcomputer.com – Author: Bill Toulas The Phishing as a Service (PhaaS) platform ‘LabHost’ has been helping cybercriminals target North American banks, particularly financial institutes in...
Black Basta, Bl00dy ransomware gangs join ScreenConnect attacks – Source: www.bleepingcomputer.com
Source: www.bleepingcomputer.com – Author: Sergiu Gatlan The Black Basta and Bl00dy ransomware gangs have joined widespread attacks targeting ScreenConnect servers unpatched against a maximum severity authentication...
Russian hackers hijack Ubiquiti routers to launch stealthy attacks – Source: www.bleepingcomputer.com
Source: www.bleepingcomputer.com – Author: Sergiu Gatlan Russian military hackers are using compromised Ubiquiti EdgeRouters to evade detection, the FBI says in a joint advisory issued with...
Hessen Consumer Center says systems encrypted by ransomware – Source: www.bleepingcomputer.com
Source: www.bleepingcomputer.com – Author: Bill Toulas The story incorrectly stated that the Hessen state in Germany was attacked. The story has been updated to clarify that...
Malicious code in Tornado Cash governance proposal puts user funds at risk – Source: www.bleepingcomputer.com
Source: www.bleepingcomputer.com – Author: Bill Toulas Malicious JavaScript code hidden in a Tornado Cash governance proposal has been leaking deposit notes and data to a private...
Windows February 2024 updates fail to install with 0x800F0922 errors – Source: www.bleepingcomputer.com
Source: www.bleepingcomputer.com – Author: Sergiu Gatlan Microsoft says the February 2024 updates fail to install on Windows 11 22H2 and 23H2 systems, with 0x800F0922 errors and...
CrowdStrike 2024 Global Threat Report: 6 Key Takeaways – Source: www.techrepublic.com
Source: www.techrepublic.com – Author: Cedric Pernet Highlights from CrowdStrike’s 2024 report: Identity-based and social engineering attacks still take center stage. Cloud-environment intrusions have increased by 75%...
4 Best Free VPNs for 2024 – Source: www.techrepublic.com
Source: www.techrepublic.com – Author: Luis Millares Best overall free VPN: Proton VPN Best for basic protection: hide.me VPN Best for multiple devices: Windscribe VPN Best beginner...
Apple Announces Post-Quantum Encryption Algorithms for iMessage – Source: www.schneier.com
Source: www.schneier.com – Author: Bruce Schneier Apple announced PQ3, its post-quantum encryption standard based on the Kyber secure key-encapsulation protocol, one of the post-quantum algorithms selected...
Malicious Packages in npm, PyPI Highlight Supply Chain Threat – Source: securityboulevard.com
Source: securityboulevard.com – Author: Jeffrey Burt Threat groups continue to look to open source software repositories to launch supply-chain attacks, with cybersecurity vendor Phylum reporting about...
USENIX Security ’23 – Synchronization Storage Channels (S2C): Timer-less Cache Side-Channel Attacks on the Apple M1 via Hardware Synchronization Instructions – Source: securityboulevard.com
Source: securityboulevard.com – Author: Marc Handelman Authors/Presenters: Jiyong Yu, Aishani Dutta, Trent Jaeger, David Kohlbrenner, Christopher W. Fletcher Many thanks to USENIX for publishing their outstanding...
Save Time and Steps with Ignyte’s Control Inheritance Automation – Source: securityboulevard.com
Source: securityboulevard.com – Author: Ignyte Team If you are managing multiple GRC frameworks for multiple environments, then you know how powerful it is to have clearly-defined...
Making Companies Whole: The Impact of Cyber Insurance on Materiality – Source: securityboulevard.com
Source: securityboulevard.com – Author: Axio Hot Topics Malicious Packages in npm, PyPI Highlight Supply-Chain Threat USENIX Security ’23 – Synchronization Storage Channels (S2C): Timer-less Cache Side-Channel...
Randall Munroe’s XKCD ‘Light Leap Years’ – Source: securityboulevard.com
Source: securityboulevard.com – Author: Marc Handelman via the comic artistry and dry wit of Randall Munroe, creator of XKCD Permalink *** This is a Security Bloggers...
USENIX Security ’23 – Daniel Katzman, William Kosasih, Chitchanok Chuengsatiansup, Eyal Ronen, Yuval Yarom – The Gates of Time: Improving Cache Attacks with Transient Execution – Source: securityboulevard.com
Source: securityboulevard.com – Author: Marc Handelman Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong commitment to Open...
LockBit Ransomware Group Returns After Law Enforcement Operation – Source: securityboulevard.com
Source: securityboulevard.com – Author: Jeffrey Burt The LockBit ransomware group is swinging back days after U.S. and UK law enforcement agencies announced they had disrupted the...
The xSPM Trend: Security Posture Management for Everything – Source: securityboulevard.com
Source: securityboulevard.com – Author: Gilad David Maayan Before we dive into the xSPM trend, let’s define what security posture management (SPM) is. SPM refers to the...
Profiling the xDedic Cybercrime Service Enterprise – Source: securityboulevard.com
Source: securityboulevard.com – Author: Dancho Danchev The popular cybercrime-friendly xDedic service was recently shut down and in this analysis we’ll take an in-depth look inside the...
Lost to the Highest Bidder: The Economics of Cybersecurity Staffing – Source: securityboulevard.com
Source: securityboulevard.com – Author: Maria Chachas Mastakas For about a decade, much has been written about the scarcity of qualified cybersecurity talent. There’s no lack of...
North Korean Group Seen Snooping on Russian Foreign Ministry – Source: www.databreachtoday.com
Source: www.databreachtoday.com – Author: 1 Cyberwarfare / Nation-State Attacks , Fraud Management & Cybercrime , Government Espionage Groups Deploy Info Stealer to Monitor Russia’s Diplomatic Moves...
SSH Exec Rami Raulas Named Interim CEO in Finnish Shakeup – Source: www.databreachtoday.com
Source: www.databreachtoday.com – Author: 1 Encryption & Key Management , Governance & Risk Management , Operational Technology (OT) Teemu Tunkelo Left SSH Abruptly After License Sales...
Groups Warn Health Sector of Change Healthcare Cyber Fallout – Source: www.databreachtoday.com
Source: www.databreachtoday.com – Author: 1 3rd Party Risk Management , Fraud Management & Cybercrime , Governance & Risk Management Some Researchers Confident ConnectWise ScreenConnect Flaw Was...





























