Why Healthcare Can't Afford to Ignore Digital IdentityInvesting in digital identity can improve security, increase clinical productivity, and boost healthcare's bottom line. — by Gus Malezis, CEO of...
KamiKakaBot Malware Used in Latest Dark Pink APT Attacks on Southeast Asian Targets
KamiKakaBot Malware Used in Latest Dark Pink APT Attacks on Southeast Asian TargetsThe Dark Pink advanced persistent threat (APT) actor has been linked to a fresh set of...
Researchers Uncover Over a Dozen Security Flaws in Akuvox E11 Smart Intercom
Researchers Uncover Over a Dozen Security Flaws in Akuvox E11 Smart IntercomMore than a dozen security flaws have been disclosed in E11, a smart intercom product...
Warning: AI-generated YouTube Video Tutorials Spreading Infostealer Malware
Warning: AI-generated YouTube Video Tutorials Spreading Infostealer MalwareThreat actors have been increasingly observed using AI-generated YouTube Videos to spread a variety of stealer malware such as...
How to Apply NIST Principles to SaaS in 2023
How to Apply NIST Principles to SaaS in 2023The National Institute of Standards and Technology (NIST) is one of the standard-bearers in global cybersecurity. The U.S.-based...
Fake ChatGPT Chrome Extension Hijacking Facebook Accounts for Malicious Advertising
Fake ChatGPT Chrome Extension Hijacking Facebook Accounts for Malicious AdvertisingA fake ChatGPT-branded Chrome browser extension has been found to come with capabilities to hijack Facebook accounts...
Large-scale Cyber Attack Hijacks East Asian Websites for Adult Content Redirects
Large-scale Cyber Attack Hijacks East Asian Websites for Adult Content RedirectsA widespread malicious cyber operation has hijacked thousands of websites aimed at East Asian audiences to...
Linux gets double-quick double-update to fix kernel Oops!
Linux gets double-quick double-update to fix kernel Oops!Linux doesn't BSoD. It has oopses and panics instead. (We show you how to make a kernel module to...
LogonBox SSPR 2.3.20
LogonBox SSPR 2.3.20Introduction LogonBox is pleased to announce the immediate availability of LogonBox SSPR 2.3.20.This release includes the ability to force AD schema versions and changes...
LogonBox VPN 2.3.20
LogonBox VPN 2.3.20Introduction LogonBox is pleased to announce the immediate availability of LogonBox VPN 2.3.20.This release includes the ability to force AD schema versions and additions...
Unreleased findings from the Entrust Cybersecurity Institute’s “Future of Identity” Report
Unreleased findings from the Entrust Cybersecurity Institute’s “Future of Identity” ReportYounger consumers – especially Gen Z – value the promise of simplified experiences that digital... The...
The Failure of Silicon Valley Bank Is a Ground-Shaking Crisis—and a Cybersecurity Red Alert
The Failure of Silicon Valley Bank Is a Ground-Shaking Crisis—and a Cybersecurity Red AlertLast year, Silicon Valley Bank (SVB) enjoyed a market capitalization of $44 billion....
Recent CISA KEV Additions Include Silent Fixes and Unpatched Vulnerabilities
Recent CISA KEV Additions Include Silent Fixes and Unpatched VulnerabilitiesFlashpoint has observed two major discrepancies with CVE-2022-35914 and CVE-2022-33891. Security teams need to be aware that...
Augmented Software Engineering in an AI Era
Augmented Software Engineering in an AI EraArtificial Intelligence (AI) has been making waves in many industries, and software engineering is no exception. AI has the potential...
White House to Regulate Cloud Security: Good Luck With That
White House to Regulate Cloud Security: Good Luck With That Be careful what you wish for: Biden wants new regulations for cloud providers—but we’re not sure...
Why Organizations Need to Care About Machine Identity Management
Why Organizations Need to Care About Machine Identity ManagementMachine Identity Management (MIM) is an essential component of an organization’s cybersecurity program. The post Why Organizations Need...
USENIX Security ’22 – Timothy Trippel, Kang G. Shin, Alex Chernyakhovsky, Garret Kelly, Dominic Rizzo, Matthew Hicks – ‘Fuzzing Hardware Like Software’
USENIX Security ’22 – Timothy Trippel, Kang G. Shin, Alex Chernyakhovsky, Garret Kelly, Dominic Rizzo, Matthew Hicks – ‘Fuzzing Hardware Like Software’Our thanks to USENIX for...
50 Threat Hunting Hypothesis Examples
50 Threat Hunting Hypothesis ExamplesThreat hunting is a proactive and critical aspect of cybersecurity that involves searching for signs of malicious activity on your organization’s networks...
Booking.com account takeover flaw shows possible pitfalls in OAuth implementations
Booking.com account takeover flaw shows possible pitfalls in OAuth implementationsBooking.com, one of the world's largest online travel agencies, recently patched a vulnerability in its implementation of...
Software liability reform is liable to push us off a cliff
Software liability reform is liable to push us off a cliffLike “SBOMs will solve everything,” there is a regular cry to reform software liability, specifically in...
Gitpod flaw shows cloud-based development environments need security assessments
Gitpod flaw shows cloud-based development environments need security assessmentsResearchers from cloud security firm Snyk recently discovered a vulnerability that would have allowed attackers to perform full...
White House releases an ambitious National Cybersecurity Strategy
White House releases an ambitious National Cybersecurity StrategyThe White House released its long-anticipated National Cybersecurity Strategy, a comprehensive document that offers fundamental changes in how the...
6 reasons why your anti-phishing strategy isn’t working
6 reasons why your anti-phishing strategy isn’t workingPhishing attempts are typically like fishing in a barrel — given enough time, a bad actor is 100% likely...
Blackbaud penalized $3M for not disclosing the full scope of ransomware attack
Blackbaud penalized $3M for not disclosing the full scope of ransomware attackSoftware firm Blackbaud has agreed to pay a $3 million penalty for failing to disclose...
Dark Pink APT group linked to new KamiKakaBot attacks in Southeast Asia
Dark Pink APT group linked to new KamiKakaBot attacks in Southeast AsiaThe recently identified Dark Pink advanced persistent threat (APT) group is likely behind a fresh...
5 signs you’ve fallen for a scam – and what to do next
5 signs you’ve fallen for a scam – and what to do nextHere’s how to know you have fallen victim to a scam – and what...
Blackbaud Settles $3m Charge Over Ransomware Attack
Blackbaud Settles $3m Charge Over Ransomware AttackSEC claims company filed misleading disclosuresRead MoreSEC claims company filed misleading disclosures
Investment Fraud is Now Biggest Cybercrime Earner
Investment Fraud is Now Biggest Cybercrime EarnerCategory surged 127% year-on-year, says FBIRead MoreCategory surged 127% year-on-year, says FBI
Final Three Sentenced in £70m Money Laundering Case
Final Three Sentenced in £70m Money Laundering CaseLondon-based group also illegally obtained COVID relief fundsRead MoreLondon-based group also illegally obtained COVID relief funds
Unlocking the Benefits and Trade-Offs of Agentless Cloud Security
Unlocking the Benefits and Trade-Offs of Agentless Cloud SecurityAgentless cloud security solutions were among the most talked-about topics during the Cloud & Cyber Security Expo, set...





























