Entity Will Pay $4.3 Million Settlement in 2nd Big Hack CaseDeal to End Lawsuit in 2021 Breach Follows a $4.2 Million Settlement in a 2019 HackA...
Author:
European IoT Manufacturers Lag in Vulnerability Disclosure
European IoT Manufacturers Lag in Vulnerability DisclosureResearch Firm CEO Says IoT Makers Treat Cybersecurity as Somebody Else's ProblemA review of internet of things manufacturers by Copper...
Coinbase Fined 3.3 Million Euros by Dutch Central Bank
Coinbase Fined 3.3 Million Euros by Dutch Central BankCompany Delayed Registering as a Money Transmitter, Say BankersThe Dutch central bank fined Coinbase 3.3 million euros, saying...
Agencias federales de EE.UU. son víctimas de un ataque cibernético que utiliza software RMM legítimo
Agencias federales de EE.UU. son víctimas de un ataque cibernético que utiliza software RMM legítimoAl menos dos agencias federales en los EE. UU. fueron víctimas de...
¡Cuidado! Descubren nueva variante de malware PlugX que se propaga a través de dispositivos USB extraíbles
¡Cuidado! Descubren nueva variante de malware PlugX que se propaga a través de dispositivos USB extraíblesLos investigadores de seguridad cibernética han descubierto una muestra de PlugX...
Twilio Hackers Scarf 10K Okta Credentials in Sprawling Supply-Chain Attack
Twilio Hackers Scarf 10K Okta Credentials in Sprawling Supply-Chain AttackThe "0ktapus" cyberattackers set up a well-planned spear-phishing effort that affected at least 130 orgs beyond Twilio...
Capital One Joins Open Source Security Foundation
Capital One Joins Open Source Security FoundationOpenSSF welcomes Capital One as a premier member affirming its commitment to strengthening the open source software supply chain.Read MoreDark...
Endpoint Protection / Antivirus Products Tested for Malware Protection
Endpoint Protection / Antivirus Products Tested for Malware ProtectionSix out of the eight products achieved an "A" rating or higher for blocking malware attacks. Reports are...
‘No-Party’ Data Architectures Promise More Control, Better Security
'No-Party' Data Architectures Promise More Control, Better SecurityConsumers gain control of their data while companies build better relationships with their customers — but third-party ad-tech firms...
‘Sliver’ Emerges as Cobalt Strike Alternative for Malicious C2
'Sliver' Emerges as Cobalt Strike Alternative for Malicious C2Microsoft and others say they have observed nation-state actors, ransomware purveyors, and assorted cybercriminals pivoting to an open...
LastPass Suffers Data Breach, Source Code Stolen
LastPass Suffers Data Breach, Source Code StolenResearchers warned that cyberattackers will be probing the code for weaknesses to exploit later.Read MoreDark ReadingResearchers warned that cyberattackers will...
Killnet hits Norwegian websites. Hacktivists tied to Russia’s government. Looking ahead to new cyber phases of Russia’s hybrid war. C2C market differentiation. Gennady Bukin, call your shoe store.
Killnet hits Norwegian websites. Hacktivists are tied to Russia’s government. Amunet as a case study in C2C market differentiation. C2C commodification extends to script kiddies. Andrea...
SPHERE SESSION | Carole Cadwalladr on threats to democracy
TED speaker and Pulitzer-nominated journalist Carole Cadwalladr joined us in our cyber sauna recording booth at SPHERE22, the world’s first co-security unconference, for a discussion about...
teissTalk: Shadow-IT – keeping security out of the way of productivity?
This audio-only version of our twice weekly cyber security talk show, teissTalk. Join us twice a week for free by visiting www.teiss.co.uk/talk On this episode, we...