Patch Critical Bug Now: QNAP NAS Devices Ripe for the SlaughterAnalysts find that 98% of QNAP NAS are vulnerable to CVE-2022-27596, which allows unauthenticated, remote SQL...
Author:
Super Bock says ‘cyber’ nasty ‘disrupting computer services’
Super Bock says 'cyber' nasty 'disrupting computer services'Portugal's biggest exporter of beer warns of restrictions to supply chain Super Bock Group, Portugal's largest beverage biz, is...
The Troublemaker CISO: Defending Against Insider Threat
The Troublemaker CISO: Defending Against Insider ThreatSecurity Director Ian Keller on the Need for a 'People Leader'Read MoreDataBreachToday.com RSS SyndicationSecurity Director Ian Keller on the Need...
‘No Pineapple’ Hacking Campaign Reveals North Korean Toolkit
'No Pineapple' Hacking Campaign Reveals North Korean ToolkitEspionage Campaign Bore Telltale Signs of Pyongyang - And a Major OPSEC FailureResearchers from cybersecurity firm WithSecure say they...
Ransomware Gang Stole Customer Data, Arnold Clark Confirms
Ransomware Gang Stole Customer Data, Arnold Clark ConfirmsExtortionists Dump Private and Corporate Customer Data From European Car GiantChristmastime was bleak for a number of organizations in...
Okta Lays Off 300 Employees After Sales Execution Challenges
Okta Lays Off 300 Employees After Sales Execution Challenges5% of Employees Exit in Cybersecurity Industry's 3rd-Largest Workforce ReductionOkta will execute the third-largest round of layoffs of...
Why CISOs Should Care About Brand Impersonation Scam Sites
Why CISOs Should Care About Brand Impersonation Scam SitesEnterprises often don't know whose responsibility it is to monitor for spoofed brand sites and scams that steal...
Microsoft sweeps up after breaking .NET with December security updates
Microsoft sweeps up after breaking .NET with December security updatesXPS doc display issues fixed – until the next patch, at least Microsoft this week rolled out...
Google boosts bounties for open source flaws found via fuzzing
Google boosts bounties for open source flaws found via fuzzingMax reward per project integration is now $30k Google sweetened the potential pot to $30,000 for bug...
FTC Hits Firm With $1.5M Fine in Health Data-Sharing Case
FTC Hits Firm With $1.5M Fine in Health Data-Sharing CaseFirst Enforcement Action Under 14-Year-Old FTC Health Data Breach Notification RuleThe FTC has for the first time...
Banner Year for North Korean Cryptocurrency Hacking
Banner Year for North Korean Cryptocurrency HackingChainalysis: Pyongyang Stole $1.7B in Crypto, Mainly From DeFi PlatformsNorth Korean hackers stole $1.7 billion in cryptocurrency during 2022, most...
Tanium Taps Tibco CEO Dan Streetman to Replace Orion Hindawi
Tanium Taps Tibco CEO Dan Streetman to Replace Orion HindawiCEO Change Marks First Time in Tanium's 17-Year History a non-Hindawi Is In ChargeFor the first time...
Ransomware Hit on ION Group Delays EU Derivatives Trades
Ransomware Hit on ION Group Delays EU Derivatives TradesReports Say Russian LockBit Group Carried Out Attack on Trading Software FirmAttackers this week locked up the business...
Inteligencia Artificial: Un nuevo hito para la Ciberseguridad
Inteligencia Artificial: Un nuevo hito para la CiberseguridadLa combinación de la capacidad de computación junto a la disponibilidad de inmensas cantidades de información ha permitido el...
La IA y el aprendizaje automático en la ciberseguridad: cómo determinarán el futuro
La IA y el aprendizaje automático en la ciberseguridad: cómo determinarán el futuroLa ciberseguridad con IA, con el apoyo del aprendizaje automático, está destinada a ser...
Firmware Flaws Could Spell ‘Lights Out’ for Servers
Firmware Flaws Could Spell 'Lights Out' for ServersFive vulnerabilities in the baseboard management controller (BMC) software used by 15 major vendors could allow remote code execution...
How Can Disrupting DNS Communications Thwart a Malware Attack?
How Can Disrupting DNS Communications Thwart a Malware Attack?Malware eventually has to exfiltrate the data it accessed. By watching DNS traffic for suspicious activity, organizations can...
Checkmarx Launches Threat Intelligence for Open Source Packages
Checkmarx Launches Threat Intelligence for Open Source PackagesThe new API incorporates threat intelligence research and employs machine learning to identify threats in the supply chain.Read MoreDark...
Google Fi Users Caught Up in T-Mobile Breach
Google Fi Users Caught Up in T-Mobile BreachGoogle Fi mobile customers have been alerted that their SIM card serial numbers, phone numbers, and other data were...
ManageEngine Study Finds United States Enterprises Hit by Short-Staffed Security Operations Centers
ManageEngine Study Finds United States Enterprises Hit by Short-Staffed Security Operations CentersStudy also reveals enterprises rely on multiple tools to ensure cloud security.Read MoreDark ReadingStudy also...
KnowBe4 to Offer $10,000 to Black Americans in Cybersecurity Scholarship
KnowBe4 to Offer $10,000 to Black Americans in Cybersecurity ScholarshipKnowBe4 partners with the Center for Cyber Safety and Education to support Black Americans in recognition of...
Application Security Must Be Nonnegotiable
Application Security Must Be NonnegotiableCompanies need to keep security priorities top of mind during economic downturns so all-important revenue generation doesn't come with a heaping side...
Fortra’s Terranova Security 2022 Gone Phishing Tournament Results Reveal Large Organizations at Highest Risk of Compromising Data
Fortra's Terranova Security 2022 Gone Phishing Tournament Results Reveal Large Organizations at Highest Risk of Compromising DataFindings underscore security awareness training that leverages practical, hands-on exercises...
Contrast Security Launches Alliance Program to Change the Way Customers Scale Their Security Solutions
Contrast Security Launches Alliance Program to Change the Way Customers Scale Their Security SolutionsThe Security Innovation Alliance (SIA) empowers customers to create holistic security programs by...
Command-Injection Bug in Cisco Industrial Gear Opens Devices to Complete Takeover
Command-Injection Bug in Cisco Industrial Gear Opens Devices to Complete TakeoverTwo security holes — one particularly gnarly — could allow hackers the freedom to do as...
Gem Security Emerges From Stealth With $11M, Unveils Cloud TDIR Platform for Faster Response to Cloud Threats
Gem Security Emerges From Stealth With $11M, Unveils Cloud TDIR Platform for Faster Response to Cloud ThreatsGem Security provides the world's first holistic approach for Cloud...
Attackers abuse Microsoft’s ‘verified publisher’ status to steal data
Attackers abuse Microsoft’s 'verified publisher' status to steal dataMalicious OAuth apps were the tickets into victims' systems Miscreants using malicious OAuth applications abused Microsoft's "verified publisher"...
Radiant Logic Pursues Identity Governance With Brainwave Buy
Radiant Logic Pursues Identity Governance With Brainwave BuyDeal Means Radiant Logic Can Dump Attestation-Based Audits for a More Rigorous PathRadiant Logic has agreed to buy Brainwave...
White House Mulls Banning Huawei’s Access to US Technology
White House Mulls Banning Huawei's Access to US TechnologyReports Suggest Biden Administration Weighing Move to Blunt Beijing's AmbitionsChinese technology firms could be completely banned from buying...
Piratas informáticos abusaron de las aplicaciones OAuth «Verified Publisher» de Microsoft para violar cuentas de correo electrónico corporativas
Piratas informáticos abusaron de las aplicaciones OAuth «Verified Publisher» de Microsoft para violar cuentas de correo electrónico corporativasMicrosoft dijo el martes que tomó medidas para deshabilitar...