Russia Hacked: ‘Wiper’ Attacks Spread Across Country as New RansomwareCybersecurity researchers warns that a new data-wiping trojan has hijacked judicial courts and mayoral offices in Russia....
A New Malware Exploits A Critical Vulnerability on Redis Servers
A New Malware Exploits A Critical Vulnerability on Redis ServersTo gain control of infected systems and, likely, to construct a botnet network, a new Go-based malware...
Introduction to Remote Spectrum Monitoring
Introduction to Remote Spectrum MonitoringSpectrum Monitoring for Critical Infrastructure By Brandon Malatest, Per Vices Corporation As wireless communications break its expansion banks, […] The post Introduction...
New SiriusXM Vulnerability Allows Hackers to Unlock and Start Connected Cars Remotely
New SiriusXM Vulnerability Allows Hackers to Unlock and Start Connected Cars RemotelyResearchers have recently discovered a security vulnerability that allows threat actors to remotely attack vehicles...
In Government, Secure Data Drives the Greater Good
In Government, Secure Data Drives the Greater GoodBy Carolyn Duby, Field CTO and Cybersecurity Lead, Cloudera Government Solutions As a key component of President Biden’s […]...
Is AI At the Edge Right for Your Business And Three Tips To Consider
Is AI At the Edge Right for Your Business And Three Tips To ConsiderBy Camille Morhardt, Dir Security Initiatives & Rita Wouhaybi, Senior Principal AI Engineer,...
The Role of Endpoint Security and Management In Threat Detection
The Role of Endpoint Security and Management In Threat DetectionBy Ashley Leonard, CEO & Founder, Syxsense According to a recent Verizon DBIR, 70% of security breaches...
Is Your Passwordless Solution Really Passwordless?
Is Your Passwordless Solution Really Passwordless?By Tim Callan, Chief Compliance Officer, Sectigo The term “passwordless” is a trendy marketing buzzword with no shortage […] The post...
Penetration Scanning Must Be Key Part of The Modern Business Arsenal
Penetration Scanning Must Be Key Part of The Modern Business ArsenalBy Patti Key, Chief Revenue Officer (CRO), TPx Security remains among companies’ top challenges, permeating nearly...
Minimizing the Military Attack Surface with Peer-to-Peer Communications and Zero Trust
Minimizing the Military Attack Surface with Peer-to-Peer Communications and Zero TrustBy Adam Fish, CEO, Ditto Perhaps there’s no scenario where cybersecurity is more critical than on...
CVE-2022-41974, CVE-2022-41973, CVE-2022-3328 Exploit Detection: Three Linux Vulnerabilities Chained to Gain Full Root Privileges
CVE-2022-41974, CVE-2022-41973, CVE-2022-3328 Exploit Detection: Three Linux Vulnerabilities Chained to Gain Full Root Privileges Security experts from Qualys’ Threat Research Unit warn of a novel vulnerability ...
Whoops! Researchers accidentally crash botnet used to launch DDoS and cryptomining campaigns
Whoops! Researchers accidentally crash botnet used to launch DDoS and cryptomining campaignsResearchers investigating a newly-discovered botnet have admitted that they "accidentally" broke Read more in my...
LastPass Security Breach
LastPass Security BreachThe company was hacked, and customer information accessed. No passwords were compromised. Leer másSchneier on SecurityThe company was hacked, and customer information accessed. No...
Existential Risk and the Fermi Paradox
Existential Risk and the Fermi ParadoxWe know that complexity is the worst enemy of security, because it makes attack easier and defense harder. This becomes catastrophic...
ConnectWise Quietly Patches Flaw That Helps Phishers
ConnectWise Quietly Patches Flaw That Helps PhishersConnectWise, which offers a self-hosted, remote desktop software application that is widely used by Managed Service Providers (MSPs), is warning...
CAPTCHA
CAPTCHAThis is an actual CAPTCHA I was shown when trying to log into PayPal. As an actual human and not a bot, I had no idea...
Friday Squid Blogging: Legend of the Indiana Oil-Pit Squid
Friday Squid Blogging: Legend of the Indiana Oil-Pit SquidAt a GMC plant. As usual, you can also use this squid post to talk about the security...
Judge Orders U.S. Lawyer in Russian Botnet Case to Pay Google
Judge Orders U.S. Lawyer in Russian Botnet Case to Pay GoogleIn December 2021, Google filed a civil lawsuit against two Russian men thought to be responsible...
Enhanced Protection – The strongest level of Safe Browsing protection Google Chrome has to offer
Enhanced Protection - The strongest level of Safe Browsing protection Google Chrome has to offerPosted by Benjamin Ackerman (Chrome Security and Jonathan Li (Safe Browsing) As...
Memory Safe Languages in Android 13
Memory Safe Languages in Android 13Posted by Jeffrey Vander Stoep For more than a decade, memory safety vulnerabilities have consistently represented more than 65% of vulnerabilities...
Google Chrome emergency update fixes 9th zero-day of the year
Google Chrome emergency update fixes 9th zero-day of the yearGoogle has released Chrome 108.0.5359.94/.95 for Windows, Mac, and Linux users to address a single high-severity security...
Hackers use new, fake crypto app to breach networks, steal cryptocurrency
Hackers use new, fake crypto app to breach networks, steal cryptocurrencyThe North Korean 'Lazarus' hacking group is linked to a new attack spreading fake cryptocurrency apps...
Industry 4.0: CNC Machine Security Risks Part 2
Industry 4.0: CNC Machine Security Risks Part 2This three-part blog series explores the risks associated with CNC machinesLeer másTrend Micro Research, News, PerspectivesThis three-part blog series...
The Week in Ransomware – December 2nd 2022 – Disrupting Health Care
The Week in Ransomware - December 2nd 2022 - Disrupting Health CareThis week's big news was the Colombia health system being severely disrupted by a ransomware...
SIM swapper gets 18-months for involvement in $22 million crypto heist
SIM swapper gets 18-months for involvement in $22 million crypto heistFlorida man Nicholas Truglia was sentenced to 18 months in prison on Thursday for his involvement...
Open source software host Fosshost shutting down as CEO unreachable
Open source software host Fosshost shutting down as CEO unreachableOpen source software hosting provider Fosshost will no longer be providing services as it reaches end of...
Android malware apps with 2 million installs spotted on Google Play
Android malware apps with 2 million installs spotted on Google PlayA new set of Android malware, phishing, and adware apps have infiltrated the Google Play store, tricking...
OpenAI’s new ChatGPT bot: 10 coolest things you can do with it
OpenAI's new ChatGPT bot: 10 coolest things you can do with itFrom precisely spotting security vulnerabilities in your code, to writing an entire block of functional code on...
Hackers hijack Linux devices using PRoot isolated filesystems
Hackers hijack Linux devices using PRoot isolated filesystemsHackers are abusing the open-source Linux PRoot utility in BYOF (Bring Your Own Filesystem) attacks to provide a consistent...
Severe AMI MegaRAC flaws impact servers from AMD, ARM, HPE, Dell, others
Severe AMI MegaRAC flaws impact servers from AMD, ARM, HPE, Dell, othersThree vulnerabilities in the American Megatrends MegaRAC Baseboard Management Controller (BMC) software impact server equipment...
