FAANGs failing on keeping user data safe from bug huntersTime to call in the legal team Black Hat Dylan Ayrey, a bug hunter and CEO of...
Black Basta: New ransomware threat aiming for the big league
Black Basta: New ransomware threat aiming for the big leagueMany ransomware gangs have risen to the top over the years only to suddenly disband and be...
73 NPS—How to Get a High Net Promoter Score in Bot Protection
73 NPS—How to Get a High Net Promoter Score in Bot ProtectionDataDome's high NPS (mentioned in The Forrester Wave: Bot Management, Q2 2022) is 73—far above...
How a Venezuelan disinformation campaign swayed voters in Colombia
How a Venezuelan disinformation campaign swayed voters in ColombiaEver since the Kremlin's troll farm, the Internet Research Agency, targeted the American electorate during the 2016 U.S....
Aspen Security Forum 2022 – Moderator: David Sanger – Technology and National Security
Aspen Security Forum 2022 – Moderator: David Sanger – Technology and National SecurityJane Harman, Distinguished Fellow and President Emerita, Wilson Center Kent Walker, President, Global Affairs...
Cisco admits hack on IT network, links attacker to LAPSUS$ threat group
Cisco admits hack on IT network, links attacker to LAPSUS$ threat groupIT, networking, and cybersecurity solutions giant Cisco has admitted suffering a security incident targeting its...
Applying Identity to DevSecOps Processes
Applying Identity to DevSecOps ProcessesApplying Identity to DevSecOps Processes brooke.crothers Thu, 08/11/2022 - 12:11 5 views Identity Means Secrets You prove identity by validating credentials; secrets...
Three UK-based Nigerian BEC Scammers Used Construction Intelligence Service to Target Victims
Three UK-based Nigerian BEC Scammers Used Construction Intelligence Service to Target Victims On 10AUG2022 three Nigerians were extradited from the UK to the US to face charges...
What happened to the Lapsus$ hackers?
What happened to the Lapsus$ hackers?[Editor's note: This article originally appeared on the CSO Germany website on July 29.] Claire Tills, senior research engineer at Tenable,...
Hybrid Security Threats and Malign Influence Campaigns
Hybrid Security Threats and Malign Influence CampaignsThree key vulnerabilities to keep on the radar The post Hybrid Security Threats and Malign Influence Campaigns appeared first on...
Critical Flaws Disclosed in Device42 IT Asset Management Software
Critical Flaws Disclosed in Device42 IT Asset Management SoftwareCybersecurity researchers have disclosed multiple severe security vulnerabilities asset management platform Device42 that, if successfully exploited, could enable a malicious...
Detecting Follina (CVE-2022-30190): Microsoft Office Zero-Day Exploit
Detecting Follina (CVE-2022-30190): Microsoft Office Zero-Day ExploitFollina (CVE-2022-30190) is a Microsoft Office zero-day vulnerability that has recently been discovered. It’s a high-severity vulnerability that hackers can...
Cisco Confirms It’s Been Hacked by Yanluowang Ransomware Gang
Cisco Confirms It's Been Hacked by Yanluowang Ransomware GangNetworking equipment major Cisco on Wednesday confirmed it was the victim of a cyberattack on May 24, 2022...
Hackers Behind Cuba Ransomware Attacks Using New RAT Malware
Hackers Behind Cuba Ransomware Attacks Using New RAT MalwareThreat actors associated with the Cuba ransomware have been linked to previously undocumented tactics, techniques and procedures (TTPs),...
Network mistakes, misconfigurations cost companies millions
Network mistakes, misconfigurations cost companies millionsNetwork misconfigurations cost companies an average of 9% of annual revenues, according to a study released Wednesday by a network security...
What the Zola Hack Can Teach Us About Password Security
What the Zola Hack Can Teach Us About Password SecurityPassword security is only as strong as the password itself. Unfortunately, we are often reminded of the...
Conti Cybercrime Cartel Using ‘BazarCall’ Phishing Attacks as Initial Attack Vector
Conti Cybercrime Cartel Using 'BazarCall' Phishing Attacks as Initial Attack VectorA trio of offshoots from the notorious Conti cybercrime cartel have resorted to the technique of...
Black Hat 2022 Trip Report
Black Hat 2022 Trip Report It felt like I had stepped out of a time machine and it was 2019. I was walking about a mile...
Fast and Secure VPN on a Budget? Private Internet Access VPN Has You Covered
Fast and Secure VPN on a Budget? Private Internet Access VPN Has You CoveredBack when the internet consisted of a handful of computers networked together across...
Facebook Testing Default End-to-End Encryption and Encrypted Backup in Messenger
Facebook Testing Default End-to-End Encryption and Encrypted Backup in MessengerSocial media company Meta said it will begin testing end-to-end encryption (E2EE) on its Messenger platform this...
#BHUSA: New Open Source Group Set to Streamline Threat Detection
#BHUSA: New Open Source Group Set to Streamline Threat DetectionNew open source project set to reduce operational pain for SecOps analystsLeer másNew open source project set...
Top cybersecurity products unveiled at Black Hat 2022
Top cybersecurity products unveiled at Black Hat 2022Zero trust security management, extended detection and response (XDR), and a host of other threat and vulnerability management offerings...
What is a Zero Trust Environment? | HYPR
What is a Zero Trust Environment? | HYPR Cybersecurity is as guilty as any other industry when it comes to buzzwords, and one of the most...
Supply Chain Cybersecurity – the importance of everyone
Supply Chain Cybersecurity – the importance of everyoneThis week, I spoke with a new client who told me all about how they are looking forward to...
#BHUSA: Russia’s Wiper Attacks Against Ukraine Detailed
#BHUSA: Russia's Wiper Attacks Against Ukraine DetailedAccording to researchers, Russia is rolling out a growing list of wiper attacks against UkraineLeer másAccording to researchers, Russia is...
Cisco Confirms Network Breach Via Hacked Employee Google Account
Cisco Confirms Network Breach Via Hacked Employee Google AccountNetworking giant says attackers gained initial access to an employee’s VPN client via a compromised Google account.Leer másThreatpostNetworking...
FAANGs failing on keeping user data safe from bug hunters
FAANGs failing on keeping user data safe from bug huntersTime to call in the legal team Black Hat Dylan Ayrey, a bug hunter and CEO of...
New Hacker Forum Takes Pro-Ukraine Stance
New Hacker Forum Takes Pro-Ukraine StanceA uniquely politically motivated site called DUMPS focuses solely on threat activity directed against Russia and BelarusLeer másThreatpostA uniquely politically motivated...
#BHUSA: The Cyber Safety Review Board Outlines Log4j Lessons
#BHUSA: The Cyber Safety Review Board Outlines Log4j LessonsThe CSRB concluded that the initial disclosure on Log4j was done right, but there is still much to...
Starlink Successfully Hacked Using $25 Modchip
Starlink Successfully Hacked Using $25 ModchipBelgian researcher Lennert Wouters revealed at Black Hat how he mounted a successful fault injection attack on a user terminal for...