LockBit claims ransomware attack on security giant Entrust, leaks dataThe LockBit ransomware gang has claimed responsibility for the June cyberattack on digital security giant Entrust. [...]Leer...
Russian APT29 hackers abuse Azure services to hack Microsoft 365 users
Russian APT29 hackers abuse Azure services to hack Microsoft 365 usersThe state-backed Russian cyberespionage group Cozy Bear has been particularly prolific in 2022, targeting Microsoft 365...
Alternatives to facial recognition authentication
Alternatives to facial recognition authenticationLearn the problem with facial recognition as well as software and hardware alternatives to the technology. The post Alternatives to facial recognition...
How to unlock 1Password on a Mac
How to unlock 1Password on a MacGet access to your passwords in a snap with 1Password on your macOS device. The post How to unlock 1Password...
CISA adds 7 vulnerabilities to list of bugs exploited by hackers
CISA adds 7 vulnerabilities to list of bugs exploited by hackersThe U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added seven vulnerabilities to its list of...
New tool checks if a mobile app’s browser is a privacy risk
New tool checks if a mobile app's browser is a privacy riskA new online tool named 'InAppBrowser' lets you analyze the behavior of in-app browsers embedded within...
How to strengthen the human element of cybersecurity
How to strengthen the human element of cybersecuritySecurity expert explains how IT leaders can work with employees to ensure security strategies and techniques are actually implemented....
Grandoreiro banking malware targets manufacturers in Spain, Mexico
Grandoreiro banking malware targets manufacturers in Spain, MexicoThe notorious 'Grandoreiro' banking trojan was spotted in recent attacks targeting employees of a chemicals manufacturer in Spain and...
241 npm and PyPI packages caught dropping Linux cryptominers
241 npm and PyPI packages caught dropping Linux cryptominersMore than 200 malicious packages were discovered infiltrating the PyPI and npm open source registries this week. These...
It’s never too early to start securing your startup
It’s never too early to start securing your startupMany startups find it difficult to strike the right balance between achieving their business goals (quick, agile development,...
The Week in Ransomware – August 19th 2022 – Evolving extortion tactics
The Week in Ransomware - August 19th 2022 - Evolving extortion tacticsBringing you the latest ransomware news, including new research, tactics, and cyberattacks. We also saw...
What is a BISO? + everything else to know about the role
What is a BISO? + everything else to know about the roleEXECUTIVE SUMMARY: In 2020, a Business Information Security Officer (BISO) attended RSA, one of the...
MailChimp breach exposes email addresses and Callback phishing
MailChimp breach exposes email addresses and Callback phishingEXECUTIVE SUMMARY: The cloud giant known as DigitalOcean says that a recent MailChimp security breach exposed the email addresses...
Russia’s ‘Oculus’ to use AI to scan sites for banned information
Russia's 'Oculus' to use AI to scan sites for banned informationRussia's internet watchdog Roskomnadzor is developing a neural network that will use artificial intelligence to scan websites...
Healthcare payer CISO shares real-world insights: Protecting healthcare data in the cloud
Healthcare payer CISO shares real-world insights: Protecting healthcare data in the cloudIn this interview, the CISO of an American healthcare provider offers insights into cloud security....
Africa – the most cyber attacked continent, a 2022 review of trends
Africa – the most cyber attacked continent, a 2022 review of trendsIssam El Haddioui: Head of Security Engineering, EMEA – Africa | Security Evangelist with the...
WordPress sites hacked with fake Cloudflare DDoS alerts pushing malware
WordPress sites hacked with fake Cloudflare DDoS alerts pushing malwareWordPress sites are being hacked to display fake Cloudflare DDoS protection pages to distribute malware that installs the...
Using automated release management to increase data security
Using automated release management to increase data securityDevin Partida writes about cyber security and technology. She is also the Editor-in-Chief of ReHack.com. Developers working on apps may...
Hackers steal crypto from Bitcoin ATMs by exploiting zero-day bug
Hackers steal crypto from Bitcoin ATMs by exploiting zero-day bugHackers have exploited a zero-day vulnerability in General Bytes Bitcoin ATM servers to steal cryptocurrency from customers....
10 key facts about callback phishing attacks
10 key facts about callback phishing attacksIs callback phishing on your radar screen? Hackers launch callback phishing campaigns to breach corporate networks. Once in the network,...
Hackers target hotel and travel companies with fake reservations
Hackers target hotel and travel companies with fake reservationsA hacker tracked as TA558 has upped their activity this year, running phishing campaigns that target multiple hotels...
A CISO’s critical recommendations for threat intel
A CISO’s critical recommendations for threat intelBy Pete Nicoletti, Check Point Field CISO, Americas If leveraged appropriately, cyber threat intelligence is a critical cyber security tool...
An encrypted ZIP file can have two correct passwords — here’s why
An encrypted ZIP file can have two correct passwords — here's whyPassword-protected ZIP archives are common means of compressing and sharing sets of files—from sensitive documents to...
58% of Organizations Surveyed Report that Third Parties and Suppliers Were the Target of a Cloud-Based Breach in 2021, Cloud Security Alliance and Proofpoint Study Reveals
58% of Organizations Surveyed Report that Third Parties and Suppliers Were the Target of a Cloud-Based Breach in 2021, Cloud Security Alliance and Proofpoint Study RevealsContenido...
How secure is your hybrid data center?
How secure is your hybrid data center?By Dave Gronner, Product Marketing Manager, Security Platforms, Check Point. As data centers evolve, so do the cyber attacks An...
Top 7 reasons to try out the CISO-as-a-Service model
Top 7 reasons to try out the CISO-as-a-Service modelEXECUTIVE SUMMARY: Dedicated security expertise, optimization, governance and innovation on-demand? Almost. For a subset of businesses, the CISO-as-a-Service...
CVE-2022-31656: critical auth bypass flaw in multiple VMware products
CVE-2022-31656: critical auth bypass flaw in multiple VMware productsVMware on Tuesday announced patches for several critical and high-severity vulnerabilities affecting VMware Workspace ONE Access, Identity Manager,...
Black Hat insights: Getting bombarded by multiple ransomware attacks has become commonplace
Black Hat insights: Getting bombarded by multiple ransomware attacks has become commonplaceThe top ransomware gangs have become so relentless that it’s not unusual for two or...
Cybersecurity Solutions Must Evolve, Says Netography CEO
Cybersecurity Solutions Must Evolve, Says Netography CEOJust as cyber criminals change tactics and strategy for more effectiveness, so must infosec pros and their organizations, according to...
State-Sponsored APTs Dangle Job Opps to Lure In Spy Victims
State-Sponsored APTs Dangle Job Opps to Lure In Spy VictimsAPTs continue to exploit the dynamic job market and the persistent phenomenon of remote working, as explored...



























