Source: www.darkreading.com – Author: Mike Walters Source: Vladimir Zuev via Alamy Stock Photo COMMENTARY In December 2020, the SolarWinds attack sent shockwaves around the world. Attackers...
Pro-Israeli Hacktivists Attack Iranian Gas Stations – Source: www.darkreading.com
Source: www.darkreading.com – Author: Dan Raywood, Senior Editor, Dark Reading 2 Min Read Source: Konstantin Savusia via Alamy Stock Photo Hacktivist group Predatory Sparrow says it...
Beware: Experts Reveal New Details on Zero-Click Outlook RCE Exploits – Source:thehackernews.com
Source: thehackernews.com – Author: . Dec 18, 2023NewsroomEmail Security / Vulnerability Technical details have emerged about two now-patched security flaws in Microsoft Windows that could be...
Top 7 Trends Shaping SaaS Security in 2024 – Source:thehackernews.com
Source: thehackernews.com – Author: . Over the past few years, SaaS has developed into the backbone of corporate IT. Service businesses, such as medical practices, law...
Rhadamanthys Malware: Swiss Army Knife of Information Stealers Emerges – Source:thehackernews.com
Source: thehackernews.com – Author: . The developers of the information stealer malware known as Rhadamanthys are actively iterating on its features, broadening its information-gathering capabilities and...
Four U.S. Nationals Charged in $80 Million Pig Butchering Crypto Scam – Source:thehackernews.com
Source: thehackernews.com – Author: . Dec 18, 2023NewsroomCryptocurrency / Online Scam Four U.S. nationals have been charged for participating in an illicit scheme that earned them...
Healthcare Cybersecurity Proposal Stirs Industry Opposition – Source: www.govinfosecurity.com
Source: www.govinfosecurity.com – Author: 1 Healthcare , Industry Specific , Standards, Regulations & Compliance What Should the US Government Do to Impove Medical Cybersecurity? Marianne Kolbasuk...
Mr. Cooper Hacking Incident Affects Data of 14.7 Million – Source: www.govinfosecurity.com
Source: www.govinfosecurity.com – Author: 1 Finance & Banking , Incident & Breach Response , Industry Specific Data Stolen From Mortgage Lender Includes Bank Account Numbers David...
Iran Hit by Major Cyberattack Targeting Nation’s Fuel Supply – Source: www.govinfosecurity.com
Source: www.govinfosecurity.com – Author: 1 Critical Infrastructure Security , Cyberwarfare / Nation-State Attacks , Fraud Management & Cybercrime Cyber Group Dubbed Predatory Sparrow Takes Responsibility for...
A Suspected Cyberattack Paralyzes the Majority of Gas Stations Across Iran – Source: www.securityweek.com
Source: www.securityweek.com – Author: Associated Press Nearly 70% of Iran’s nearly 33,000 gas stations went out of service on Monday following possible cyberattacks, Iranian state TV...
CISA Urges Manufacturers to Eliminate Default Passwords After Recent ICS Attacks – Source: www.securityweek.com
Source: www.securityweek.com – Author: Eduard Kovacs CISA is advising device makers to stop relying on customers to change default passwords following attacks targeting water sector ICS....
VF Corp Disrupted by Cyberattack, Online Operations Impacted – Source: www.securityweek.com
Source: www.securityweek.com – Author: Ryan Naraine VF Corporation (NYSE: VFC), which owns and operates some of the biggest apparel and footwear brands, has been hit by...
CISA Flags Gaps in Healthcare Org’s Security Posture, Issues Security Guidance – Source: www.securityweek.com
Source: www.securityweek.com – Author: Ionut Arghire The US cybersecurity agency CISA issues cybersecurity recommendations for the healthcare and public health sector. The post CISA Flags Gaps...
NSA Issues Guidance on Incorporating SBOMs to Improve Cybersecurity – Source: www.securityweek.com
Source: www.securityweek.com – Author: Ionut Arghire NSA has published guidance to help organizations incorporate SBOM to mitigate supply chain risks. The post NSA Issues Guidance on...
SMTP Smuggling Allows Spoofed Emails to Bypass Authentication Protocols – Source: www.securityweek.com
Source: www.securityweek.com – Author: Eduard Kovacs A new attack technique named SMTP Smuggling can allow malicious actors to send out spoofed emails that bypass authentication mechanisms....
Salvador Technologies Raises $6 Million for ICS/OT Attack Recovery Solution – Source: www.securityweek.com
Source: www.securityweek.com – Author: Eduard Kovacs Salvador Technologies has raised $6 million for its operational continuity and cyberattack recovery platform for ICS and OT. The post...
Delta Dental Says Data Breach Exposed 7 Million Customers – Source: www.securityweek.com
Source: www.securityweek.com – Author: Ionut Arghire Delta Dental of California says over 6.9 million individuals were impacted by a data breach caused by the MOVEit hack....
SEC Shares Important Clarifications as New Cyber Incident Disclosure Rules Come Into Effect – Source: www.securityweek.com
Source: www.securityweek.com – Author: Eduard Kovacs The SEC has provided some important clarifications on its new cyber incident disclosure requirements, which come into effect on December...
3CX Urges Customers to Disable Integration Due to Potential Vulnerability – Source: www.securityweek.com
Source: www.securityweek.com – Author: Ionut Arghire 3CX tells customers to temporarily disable SQL Database integration to mitigate a potential vulnerability. The post 3CX Urges Customers to...
Unmasking the Dark Side of Low-Code/No-Code Applications – Source:thehackernews.com
Source: thehackernews.com – Author: . Low-code/no-code (LCNC) and robotic process automation (RPA) have gained immense popularity, but how secure are they? Is your security team paying...
QakBot Malware Resurfaces with New Tactics, Targeting the Hospitality Industry – Source:thehackernews.com
Source: thehackernews.com – Author: . Dec 18, 2023NewsroomMalware / Cybersecurity A new wave of phishing messages distributing the QakBot malware has been observed, more than three...
CISA Urges Manufacturers Eliminate Default Passwords to Thwart Cyber Threats – Source:thehackernews.com
Source: thehackernews.com – Author: . Dec 18, 2023NewsroomSoftware Security / Vulnerability The U.S. Cybersecurity and Infrastructure Security Agency (CISA) is urging manufacturers to get rid of...
WordPress hosting service Kinsta targeted by Google phishing ads – Source: www.bleepingcomputer.com
Source: www.bleepingcomputer.com – Author: Mayank Parmar WordPress hosting provider Kinsta is warning customers that Google ads have been observed promoting phishing sites to steal hosting credentials....
Rhadamanthys Stealer malware evolves with more powerful features – Source: www.bleepingcomputer.com
Source: www.bleepingcomputer.com – Author: Bill Toulas The developers of the Rhadamanthys information-stealing malware have recently released two major versions to add improvements and enhancements across the...
What to do when receiving unprompted MFA OTP codes – Source: www.bleepingcomputer.com
Source: www.bleepingcomputer.com – Author: Lawrence Abrams Receiving an unprompted one-time passcode (OTP) sent as an email or text should be a cause for concern as it...
Qbot malware returns in campaign targeting hospitality industry – Source: www.bleepingcomputer.com
Source: www.bleepingcomputer.com – Author: Lawrence Abrams The QakBot malware is once again being distributed in phishing campaigns after the botnet was disrupted by law enforcement over...
Radar El magazine de ciberseguridad
The content you are trying to access is private only to member users of the site. You must have a free membership at CISO2CISO.COM to access...
ULTIMATE RACI MATRIX
The content you are trying to access is private only to member users of the site. You must have a free membership at CISO2CISO.COM to access...
Threat Horizons
The content you are trying to access is private only to member users of the site. You must have a free membership at CISO2CISO.COM to access...
Privacy technology: What’s next?
The content you are trying to access is private only to member users of the site. You must have a free membership at CISO2CISO.COM to access...



















