Janet Jackson Can Crash Laptops, Credential Phishing Attacks Skyrocket, A Phone Carrier That Doesn’t Track YouJanet Jackson’s “Rhythm Nation” has been recognized as an exploit for...
Extra, Extra, VERT Reads All About It: Cybersecurity News for the Week of August 22, 2022
Extra, Extra, VERT Reads All About It: Cybersecurity News for the Week of August 22, 2022All of us at Tripwire’s Vulnerability Exposure and Research Team (VERT)...
Your DevOps Process Needs to Integrate API Security
Your DevOps Process Needs to Integrate API Security If your organization relies on the cloud, you also rely on APIs. “Whatever the project of the day...
OpenText/Micro Focus Deal Signals New Phase of Consolidation
OpenText/Micro Focus Deal Signals New Phase of Consolidation After 30 years in and around the security industry, it’s no surprise to me that business cycles repeat...
CISA Adds 10 New Known Actively Exploited Vulnerabilities to its Catalog
CISA Adds 10 New Known Actively Exploited Vulnerabilities to its CatalogThe U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Friday added 10 new actively exploited vulnerabilities...
A CISO’s Ultimate Security Validation Checklist
A CISO's Ultimate Security Validation ChecklistIf you're heading out of the office on a well-deserved vacation, are you certain the security controls you have in place...
Twilio Breach Also Compromised Authy Two-Factor Accounts of Some Users
Twilio Breach Also Compromised Authy Two-Factor Accounts of Some UsersTwilio, which earlier this month became a sophisticated phishing attack, disclosed last week that the threat actors also...
Nitrokod Crypto Miner Infected Over 111,000 Users with Copies of Popular Software
Nitrokod Crypto Miner Infected Over 111,000 Users with Copies of Popular SoftwareA Turkish-speaking entity called Nitrokod has been attributed to an active cryptocurrency mining campaign that...
LastPass Admits Hackers Stole Source Code, Proprietary Tech Info
LastPass Admits Hackers Stole Source Code, Proprietary Tech Info The last thing any company that makes its living from security wants is a security incident, but...
BSidesTLV 2022 – Rani Hod’s ‘How Not To Encrypt Your Files’
BSidesTLV 2022 – Rani Hod’s ‘How Not To Encrypt Your Files’Our thanks to BSidesTLV for publishing their outstanding conference videos on the organization's YouTube channel. Permalink...
Exposing a Compilation of Known Ransomware Group’s Dark Web Onion Web Sites – An OSINT Analysis
Exposing a Compilation of Known Ransomware Group’s Dark Web Onion Web Sites – An OSINT Analysis Dear blog readers, I've decided to share with everyone some...
Will Voluntary CISA Cyber Goals Be Enough to Protect Critical Infrastructure?
Will Voluntary CISA Cyber Goals Be Enough to Protect Critical Infrastructure?The Cybersecurity and Infrastructure Security Agency is getting pushback from critical infrastructure owners and operators on...
How to Prevent High Risk Authentication Coercion Vulnerabilities
How to Prevent High Risk Authentication Coercion VulnerabilitiesMost of us already know the basic principle of authentication, which, in its simplest form, helps us to identify...
BSidesTLV 2022 – Philip Tsukerman’s And Amir Kutcher’s ‘Unmasked! – Fighting Stealthy Execution Methods Using Process Creation Properties’
BSidesTLV 2022 – Philip Tsukerman’s And Amir Kutcher’s ‘Unmasked! – Fighting Stealthy Execution Methods Using Process Creation Properties’Our thanks to BSidesTLV for publishing their outstanding conference...
Key Points from the IBM Cost of a Data Breach Report 2022
Key Points from the IBM Cost of a Data Breach Report 2022The volume and impact of data breaches have accelerated largely in 2022, which has contributed...
Twilio hackers also breached the food delivery firm DoorDash
Twilio hackers also breached the food delivery firm DoorDashTwilio hackers also compromised the food delivery firm DoorDash, the attackers had access to company data, including customer...
New Agenda Ransomware appears in the threat landscape
New Agenda Ransomware appears in the threat landscapeTrend Micro researchers warn of a new ransomware family called Agenda, which has been used in attacks on organizations...
Security Affairs newsletter Round 381
Security Affairs newsletter Round 381A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from Security Affairs free for you in...
Experts warn of the first known phishing attack against PyPI
Experts warn of the first known phishing attack against PyPIThe Python Package Index (PyPI) warns of an ongoing phishing campaign to steal developer credentials and distribute...
Surveillance firm’s leaked docs show the purchase of an $8M iOS RCE zero-day exploit
Surveillance firm’s leaked docs show the purchase of an $8M iOS RCE zero-day exploitLeaked documents show the surveillance firm Intellexa offering exploits for iOS and Android...
Friday Squid Blogging: 14-foot Giant Squid Washes Ashore in Cape Town
Friday Squid Blogging: 14-foot Giant Squid Washes Ashore in Cape TownIt’s an Architeuthis dux, the second this year. As usual, you can also use this squid...
How to Remove Personal Information From Data Broker Sites
How to Remove Personal Information From Data Broker Sites Data brokers are companies that collect your information from a variety of sources to sell or license...
7 Signs Your Phone Has a Virus and What You Can Do
7 Signs Your Phone Has a Virus and What You Can Do Our phones store a lot of personal data, including contacts, social media account details,...
8 Signs It May Be Time for Parental Controls
8 Signs It May Be Time for Parental Controls Equipping and guiding your digitally connected child is one of the toughest challenges you will face as...
Here’s How to Steer Clear of Bot Accounts on Social Media
Here’s How to Steer Clear of Bot Accounts on Social Media “Congratulations, you’re a winner!” “Did you know this public figure is trying to make your...
Embrace change! Chris’s McAfee Journey
Embrace change! Chris’s McAfee Journey In this career-journey series, Internal Audit Manager Chris shares his recent journey joining the McAfee finance team and why he is...
K55354030: OpenJDK vulnerabilities CVE-2021-2341, CVE-2021-2369, CVE-2021-2388, CVE-2021-2432
K55354030: OpenJDK vulnerabilities CVE-2021-2341, CVE-2021-2369, CVE-2021-2388, CVE-2021-2432OpenJDK vulnerabilities CVE-2021-2341, CVE-2021-2369, CVE-2021-2388, CVE-2021-2432 Security Advisory Security Advisory Description CVE-2021-2341 Vulnerability in the Java SE, Oracle GraalVM ......
K80970653: BIG-IP iRules vulnerability CVE-2022-33962
K80970653: BIG-IP iRules vulnerability CVE-2022-33962BIG-IP iRules vulnerability CVE-2022-33962 Security Advisory Security Advisory Description The node iRules command may allow an attacker to bypass the access control...
Extending the Zero Trust Architecture Concept to APIs
Extending the Zero Trust Architecture Concept to APIsApplication programming interfaces (APIs) are critical to modern applications. APIs are used to communicate information between users and applications,...
Twilio Hackers Scarf 10K Okta Credentials in Sprawling Supply-Chain Attack
Twilio Hackers Scarf 10K Okta Credentials in Sprawling Supply-Chain AttackThe "0ktapus" cyberattackers set up a well-planned spear-phishing effort that affected at least 130 orgs beyond Twilio...




















