S3 Ep128: So you want to be a cybercriminal? [Audio + Text]Latest episode - listen now!Read MoreNaked SecurityLatest episode - listen now!
Author:
Supply chain blunder puts 3CX telephone app users at risk
Supply chain blunder puts 3CX telephone app users at riskBooby-trapped app, apparently signed and shipped by 3CX itself after its source code repository was broken into.Read...
New regulation from the SEC to require companies to report how cyber risk could affect them financially. April 2023
New regulation from the SEC to require companies to report how cyber risk could affect them financially. April 2023Articles related to cyber risk quantification, cyber risk...
March Cyber Roundup
March Cyber RoundupArticles related to cyber risk quantification, cyber risk management, and cyber resilience. The post March Cyber Roundup appeared first on Security Boulevard. Read MoreSecurity...
How to Comply with Executive Order 14028 in 4 Steps
How to Comply with Executive Order 14028 in 4 Steps Compromised supplier accounts pose a serious threat in cybersecurity. Reports estimate that over eighty percent of...
Should You Choose Agentless or Agent-Based for CNAPP?
Should You Choose Agentless or Agent-Based for CNAPP? It’s the current great debate among DevOps teams: Which cloud-native application protection platform (CNAPP) approach is best-suited to...
The Ongoing Rise in IoT Attacks: What We’re Seeing in 2023
The Ongoing Rise in IoT Attacks: What We’re Seeing in 2023As more everyday items become connected through the Internet of Things, the cyber risk landscape changes....
Why Backups and Encryption Go Hand in Hand
Why Backups and Encryption Go Hand in Hand Data sits front and center of any business. And it’s being generated in ever greater volumes. An estimated...
Technical Analysis of Xloader’s Code Obfuscation in Version 4.3
Technical Analysis of Xloader’s Code Obfuscation in Version 4.3Key Points Xloader is a popular information stealing malware family that is the successor to Formbook. In early...
Enhancing observability with IAST | AppSec | Contrast Security
Enhancing observability with IAST | AppSec | Contrast Security Observability has become crucial in software engineering as modern applications grow more complex and distributed. The rise...
Sonatype Lifecycle Enhancements Boost Speed, Security, and Productivity
Sonatype Lifecycle Enhancements Boost Speed, Security, and Productivity The post Sonatype Lifecycle Enhancements Boost Speed, Security, and Productivity appeared first on Security Boulevard. Read MoreSecurity...
Brits Slap Wrists of DDoS Kids, via NCA’s Fake Booter Sites
Brits Slap Wrists of DDoS Kids, via NCA’s Fake Booter Sites UK National Crime Agency nips it in the bud: Aims to scare straight naughty DDoS kiddies....
DXC Technology says global network is not compromised following Latitude Financial breach
DXC Technology says global network is not compromised following Latitude Financial breachSoon after Latitude Financial revealed it suffered a cyber attack, DXC Technology quietly published a...
APT group Winter Vivern exploits Zimbra webmail flaw to target government entities
APT group Winter Vivern exploits Zimbra webmail flaw to target government entitiesAn APT group known in the security industry as Winter Vivern has been exploiting a...
3CX DesktopApp compromised by supply chain attack
3CX DesktopApp compromised by supply chain attack3CX is working on a software update for its 3CX DesktopApp, after multiple security researchers alerted the company of an...
Kyndryl lays off staff in search of efficiency
Kyndryl lays off staff in search of efficiencyThe layoffs are part of a restructuring initiative aimed at improving efficiency and customer service, Kyndryl says.Read MoreCSO OnlineThe...
Thieves Steal $9m from Crypto Liquidity Pool
Thieves Steal $9m from Crypto Liquidity PoolSafeMoon claims exploited vulnerability was to blameRead MoreSafeMoon claims exploited vulnerability was to blame
NCA Celebrates Multimillion-Pound Fraud Takedowns
NCA Celebrates Multimillion-Pound Fraud TakedownsAgency says it has seized hundreds of assets in month-long operationRead MoreAgency says it has seized hundreds of assets in month-long operation
Volume of HTTPS Phishing Sites Surges 56% Annually
Volume of HTTPS Phishing Sites Surges 56% AnnuallyScammers are increasingly trying to legitimize their effortsRead MoreScammers are increasingly trying to legitimize their efforts
FDA Protects Medical Devices Against Cyber-Threats With New Measures
FDA Protects Medical Devices Against Cyber-Threats With New MeasuresNew medical devices applications should "monitor, identify, and address" cybersecurity issuesRead MoreNew medical devices applications should "monitor, identify,...
Over 70% of Employees Keep Work Passwords on Personal Devices
Over 70% of Employees Keep Work Passwords on Personal Devices95% of security leaders are also concerned about phishing attacks via private messaging appsRead More95% of security...
North Korean Hackers Use Trojanized 3CX DesktopApp in Supply Chain Attacks
North Korean Hackers Use Trojanized 3CX DesktopApp in Supply Chain AttacksWindows and Mac versions of the software were compromised to deliver infostealersRead MoreWindows and Mac versions...
New Mélofée Linux malware linked to Chinese APT groups
New Mélofée Linux malware linked to Chinese APT groupsExatrack researchers warn of an unknown China-linked hacking group that has been linked to a new Linux malware,...
3CX voice and video conferencing software victim of a supply chain attack
3CX voice and video conferencing software victim of a supply chain attackPopular voice and video conferencing software 3CX was the victim of a supply chain attack,...
The U.K. Police Hunts Cybercriminals with Fake DDoS-as-a-service Sites
The U.K. Police Hunts Cybercriminals with Fake DDoS-as-a-service SitesThe National Crime Agency (NCA) from the U.K. launched several fake DDoS-as-a-service sites. The aim is to gather...
APT43: A New Cyberthreat From North Korea
APT43: A New Cyberthreat From North KoreaA new North Korean cyber operator has been attributed to a series of attacks conducted to gather strategic intelligence aligned...
What Is User Provisioning?
What Is User Provisioning?User provisioning (also known as account provisioning) is a digital Identity and Access Management (IAM) process that involves creating employee/user accounts and their...
Companies Affected by Ransomware [2022-2023]
Companies Affected by Ransomware [2022-2023]The increasing frequency and size of ransomware attacks are becoming a huge concern for thousands of organizations globally. All over the world,...
Detect CVE-2022-47986 Exploits: Critical Pre-Authenticated Remote Code Execution Vulnerability in IBM Aspera Faspex
Detect CVE-2022-47986 Exploits: Critical Pre-Authenticated Remote Code Execution Vulnerability in IBM Aspera Faspex Stay alert! Adversaries set eyes on Aspena Faspex, an IBM file-exchange application frequently...
US sends million-dollar scammer to prison for four years
US sends million-dollar scammer to prison for four years31-year-old Solomon Ekunke Okpe, of Lagos, was a member of a gang that devised and executed a variety...





























