Organizations Face Barrage of Holiday Ransomware Attacks Many organizations remain unprepared to handle a ransomware attack on a holiday or weekend, as they continue to operate...
North Korean Hackers Spread AppleJeus Malware Disguised as Cryptocurrency Apps
North Korean Hackers Spread AppleJeus Malware Disguised as Cryptocurrency AppsThe Lazarus Group threat actor has been observed leveraging fake cryptocurrency apps as a lure to deliver...
New BMC Supply Chain Vulnerabilities Affect Servers from Dozens of Manufacturers
New BMC Supply Chain Vulnerabilities Affect Servers from Dozens of ManufacturersThree different security flaws have been disclosed in American Megatrends (AMI) MegaRAC Baseboard Management Controller (BMC) software...
Industry Coalition Urges Congress to Hold off on SBOM Requirements for Defense Contractors
Industry Coalition Urges Congress to Hold off on SBOM Requirements for Defense ContractorsThe coalition outlined the need to refine SBOM requirements before making it an obligation...
Flaw in Aged Boa Web Server Threatens Supply Chain
Flaw in Aged Boa Web Server Threatens Supply Chain Microsoft may have retired the Boa web server in 2005, but that hasn’t stopped widespread use—and now...
How to build a public profile as a cybersecurity pro
How to build a public profile as a cybersecurity proCybersecurity professionals interested in raising their profiles as subject matter experts can count on social media to...
Russian Courts Targeted by New CryWiper Data Wiper Malware Posing as Ransomware
Russian Courts Targeted by New CryWiper Data Wiper Malware Posing as RansomwareA new data wiper malware called CryWiper has been found targeting Russian government agencies, including mayor's offices...
Can you be phished in Slack?
Can you be phished in Slack?Is Slack a trusted platform for communication? The short answer is yes. The longer answer is that you should always be...
The CHRISTMA EXEC network worm – 35 years and counting!
The CHRISTMA EXEC network worm – 35 years and counting!"Uh-oh, this viruses-and-worms scene could turn out quite troublesome." If only we'd been wrong...Leer másNaked Security"Uh-oh, this...
S3 Ep111: The business risk of a sleazy “nudity unfilter” [Audio + Text]
S3 Ep111: The business risk of a sleazy “nudity unfilter” [Audio + Text]Latest episode - listen now (or read if you prefer)...Leer másNaked SecurityLatest episode -...
The FBI Says This Ransomware Scam in Cuba Raked in $60 Million From Over 100 Victims
The FBI Says This Ransomware Scam in Cuba Raked in $60 Million From Over 100 VictimsThe FBI and CISA revealed in a new joint security advisory...
BrandPost: SASE: The Only Way to Improve Network Security Without Added Complexity
BrandPost: SASE: The Only Way to Improve Network Security Without Added ComplexityBy: Mike Spanbauer, Field CTO, Security at Juniper Networks The future of network security has a...
What is Ransom Cartel? A ransomware gang focused on reputational damage
What is Ransom Cartel? A ransomware gang focused on reputational damageRansom Cartel, a ransomware-as-a-service (RaaS) operation, has stepped up its attacks over the past year after...
Number Nine! Chrome fixes another 2022 zero-day, Edge patched too
Number Nine! Chrome fixes another 2022 zero-day, Edge patched tooNinth more unto the breach, dear friends, ninth more.Leer másNaked SecurityNinth more unto the breach, dear friends,...
Apple pushes out iOS security update that’s more tight-lipped than ever
Apple pushes out iOS security update that’s more tight-lipped than everWe grabbed the update, based on no information at all, just in case we came across...
Hackers Use Archive Files and HTML Smuggling to Bypass Detection Tools
Hackers Use Archive Files and HTML Smuggling to Bypass Detection ToolsHP's latest report suggests 44% of malware was delivered via archive files in Q3 2022Leer másHP's...
Ransomware attackers allegedly demand ransom from AIIMS: police deny report
Ransomware attackers allegedly demand ransom from AIIMS: police deny reportA hacker has allegedly demanded Rs 200 crore in cryptocurrency from the All India Institute of Medical...
LastPass admits to customer data breach caused by previous breach
LastPass admits to customer data breach caused by previous breachSeems that the developer account that the crooks breached last time gave indirect access to customer data...
5 top qualities you need to become a next-gen CISO
5 top qualities you need to become a next-gen CISORansomware and data breaches pose a massive risk to organizations, resulting in loss of customer trust and...
Judge Orders U.S. Lawyer in Russian Botnet Case to Pay Google
Judge Orders U.S. Lawyer in Russian Botnet Case to Pay GoogleIn December 2021, Google filed a civil lawsuit against two Russian men thought to be responsible...
‘Black Proxies’ Enable Threat Actors to Conduct Malicious Activity
'Black Proxies' Enable Threat Actors to Conduct Malicious ActivityFirst used as botnets, their lucrative nature turned them into independent criminal enterprisesLeer másFirst used as botnets, their...
Ping of death! FreeBSD fixes crashtastic bug in network tool
Ping of death! FreeBSD fixes crashtastic bug in network toolIt's a venerable program, and this version had a venerable bug in it.Leer másNaked SecurityIt's a venerable...
Google Increases Android Security With Memory-Safe Programming Languages
Google Increases Android Security With Memory-Safe Programming LanguagesThe number of memory safety vulnerabilities in Android dropped from 223 in 2019 to 85 in 2022Leer másThe number...
AWS launches new cybersecurity service Amazon Security Lake
AWS launches new cybersecurity service Amazon Security LakeAmazon Web Services (AWS) has launched a new cybersecurity service, Amazon Security Lake, which automatically centralizes security data from...
The Slow Shift Toward Passwordless Access
The Slow Shift Toward Passwordless Access A survey of 500 DevOps and security professionals suggested that shifting away from legacy authentication technologies to embrace passwordless approaches...
Schoolyard Bully Trojan Is After Facebook Users’ Accounts
Schoolyard Bully Trojan Is After Facebook Users’ AccountsA malware campaign designed for Android devices is aiming to steal Facebook accounts users and passwords and has already...
USENIX Security ’22 – Julia Słupska, Selina Cho, Marissa Begonia, Ruba Abu-Salma, Nayanatara Prakash, Mallika Balakrishnan “They Look At Vulnerability And Use That To Abuse You”
USENIX Security ’22 – Julia Słupska, Selina Cho, Marissa Begonia, Ruba Abu-Salma, Nayanatara Prakash, Mallika Balakrishnan “They Look At Vulnerability And Use That To Abuse You”Complete...
Fortanix unveils AWS integration for centralized key management
Fortanix unveils AWS integration for centralized key managementCloud security vendor Fortanix has updated its Data Security Manager to incorporate support for AWS’ external encryption key store...
AWS’ Inspector offers vulnerability management for Lambda serverless functions
AWS' Inspector offers vulnerability management for Lambda serverless functionsAmazon Web Services has announced AWS Lambda serverless function support for its automated vulnerability management service, Amazon Inspector,...
8 things to consider amid cybersecurity vendor layoffs
8 things to consider amid cybersecurity vendor layoffs2022 has been a heavy year for layoffs in the technology sector. Whether due to budget restraints, mergers and...
