Source: www.databreachtoday.com – Author: 1. Governance & Risk Management , Identity Governance & Administration , IT Risk Management Kaiser Permanente’s Eric Liederman and Steven Frank on...
Ukraine Facing Phishing Attacks, Information Operations – Source: www.databreachtoday.com
Source: www.databreachtoday.com – Author: 1. Cyberwarfare / Nation-State Attacks , Fraud Management & Cybercrime Russia’s Invasion Tactics Include Creating Fake Hacktivist Groups, Researchers Find Mathew J....
WhatsApp, Signal Preview UK Exit Over Threat to Encryption – Source: www.databreachtoday.com
Source: www.databreachtoday.com – Author: 1. Encryption & Key Management , Geo Focus: The United Kingdom , Geo-Specific UK’s Online Safety Bill Criticized for Infringing on Private...
Threat Report Reveals Hope Despite Active Threat Landscape – Source: www.databreachtoday.com
Source: www.databreachtoday.com – Author: 1. Using a Layered Protection Strategy Is the Best Defense Against Cybercrime Grayson Milbourne • April 12, 2023 Companies have...
RSAC Fireside Chat: ‘Protective DNS’ directs smart audits, automated remediation to IP addresses
By Byron V. Acohido Domain Name Service. DNS. It’s the phone directory of the Internet. Related: DNS — the good, bad and ugly Without DNS the...
Cyberattacks Can Cost Enterprises Up to 30% of Operating Income According to ThreatConnect
ARLINGTON, Va. – April 18, 2023 – ThreatConnect, Inc, maker of leading threat intelligence operations (TI Ops) and risk quantification solutions, announced today the release of the...
Report: Over Half of North American Consumers Are Open to Passwordless
TORONTO, April 18, 2023 /PRNewswire/ — 1Password, the leader in human-centric security and privacy, today released its Preparing for a Passwordless Future report. The report revealed a strong consumer appetite for...
Netwrix Annual Security Survey: 68% of Organizations Experienced a Cyberattack Within the Last 12 Months
FRISCO, Texas, April 18, 2023 – Netwrix, a cybersecurity vendor that makes data security easy, today announced the release of its annual global 2023 Hybrid Security Trends Report. It...
KnowBe4 Phishing Test Results Reveal IT and Online Services Emails Drive Dangerous Attack Trend
Tampa Bay, FL (April 18, 2023) – KnowBe4, the provider of the world’s largest security awareness training and simulated phishing platform, today announced the results of...
Marlinspike Adds Charles Carmakal to its Advisory Board
ANNAPOLIS, Md., April 18, 2023 /PRNewswire/ — Marlinspike Partners, a venture capital investment firm focusing on disruptive dual-use technology companies advancing national security and commercial interests of the United...
NSO Group Is Back in Business With 3 New iOS Zero-Click Exploits
Israeli spyware firm NSO Group is back with at least three new iOS 15 and iOS 16 zero-click exploit chains, which were used against human rights activists...
EFF on the UN Cybercrime Treaty
EFF has a good explainer on the problems with the new UN Cybercrime Treaty, currently being negotiated in Vienna. The draft treaty has the potential to...
Using LLMs to Create Bioweapons
I’m not sure there are good ways to build guardrails to prevent this sort of thing: There is growing concern regarding the potential misuse of molecular...
10 best antivirus software for businesses in 2023
McAfee Total Protection Kaspersky CrowdStrike Falcon Bitdefender GravityZone ESET Protect Avast Business Trend Micro Malwarebytes Symantec Endpoint Security Enterprise Microsoft Defender for Endpoint It’s nearly impossible...
New DDoS attacks on Israel’s enterprises, infrastructure should be a wake-up call
Experts see the latest DDoS attacks against Israel as a case study in the effectiveness of simple, brute-force cybersecurity attacks, even against the most sophisticated targets....
Takedown of GitHub Repositories Disrupts RedLine Malware Operations – Source: www.securityweek.com – Author: Ionut Arghire –
Source: www.securityweek.com – Author: Ionut Arghire. Category & Tags: Malware & Threats,malware – Malware & Threats,malware The RedLine information stealer’s operations have been disrupted after the...
New ‘Domino’ Malware Linked to FIN7 Group, Ex-Conti Members – Source: www.securityweek.com – Author: Ionut Arghire –
Source: www.securityweek.com – Author: Ionut Arghire. Category & Tags: Malware & Threats,malware – Malware & Threats,malware Distribution campaigns for a recently identified backdoor have revealed a...
SpecterOps Scores $25M Funding to Secure ID Attack Paths – Source: www.securityweek.com – Author: Ryan Naraine –
Source: www.securityweek.com – Author: Ryan Naraine. Category & Tags: Funding/M&A,Identity & Access – Funding/M&A,Identity & Access SpecterOps, a Seattle startup building technology to secure Microsoft’s Active...
NSO Group Used at Least 3 iOS Zero-Click Exploits in 2022: Citizen Lab – Source: www.securityweek.com – Author: Eduard Kovacs –
Source: www.securityweek.com – Author: Eduard Kovacs. Category & Tags: Malware & Threats,Mobile & Wireless,Vulnerabilities,Featured,iOS,Zero-Day – Malware & Threats,Mobile & Wireless,Vulnerabilities,Featured,iOS,Zero-Day Israeli spyware vendor NSO Group used...
Elon Musk Says He’ll Create ‘TruthGPT’ to Counter AI ‘Bias’ – Source: www.securityweek.com – Author: Associated Press –
Source: www.securityweek.com – Author: Associated Press. Category & Tags: Threat Intelligence,AI,ChatGPT – Threat Intelligence,AI,ChatGPT Billionaire Twitter owner Elon Musk is again sounding warning bells on the...
Mandiant 2023 M-Trends Report Provides Factual Analysis of Emerging Threat Trends – Source: www.securityweek.com – Author: Kevin Townsend –
Source: www.securityweek.com – Author: Kevin Townsend. Category & Tags: Threat Intelligence,Report – Threat Intelligence,Report In a year dominated by kinetic/cyber war in Ukraine, North Korea doubles...
Lockr Raises $2.5 Million for Identity and Data Protection Platform – Source: www.securityweek.com – Author: Ionut Arghire –
Source: www.securityweek.com – Author: Ionut Arghire. Category & Tags: Cybersecurity Funding,Funding/M&A,funding – Cybersecurity Funding,Funding/M&A,funding Personal identity and data protection provider Lockr this week announced a $2.5...
Cyberinsurance Backstop: Can the Industry Survive Without One? – Source: www.securityweek.com – Author: Kevin Townsend –
Source: www.securityweek.com – Author: Kevin Townsend. Category & Tags: Cyber Insurance,Government,Cyberinsurance,Featured – Cyber Insurance,Government,Cyberinsurance,Featured The cyberinsurance industry is lobbying for a government backstop. The government is...
CISA Adds Chrome, macOS Bugs to Known Exploited Vulnerabilities Catalog – Source: www.securityweek.com – Author: Eduard Kovacs –
Source: www.securityweek.com – Author: Eduard Kovacs. Category & Tags: Vulnerabilities,vulnerability – Vulnerabilities,vulnerability The US Cybersecurity and Infrastructure Security Agency (CISA) has added two flaws to its...
Cybersecurity M&A Roundup for April 1-15, 2023 – Source: www.securityweek.com – Author: Eduard Kovacs –
Source: www.securityweek.com – Author: Eduard Kovacs. Category & Tags: Funding/M&A,M&A Tracker,M&A – Funding/M&A,M&A Tracker,M&A Sixteen cybersecurity-related merger and acquisition (M&A) deals were announced in the first...
Army helicopter crash blamed on skipped software patch
Graham Cluley is an award-winning security blogger, researcher and public speaker. He has been working in the computer security industry since the early 1990s. View all...
Giving a Face to the Malware Proxy Service ‘Faceless’
For the past seven years, a malware-based proxy service known as “Faceless” has sold anonymity to countless cybercriminals. For less than a dollar per day, Faceless...
New ”Domino” Malware Strain Targets Corporate Networks
Researchers recently discovered a new malware family named “Domino”, allegedly created by ITG14, also known as the FIN7 threat group. Reportedly, ex-Conti hackers have been using...
Rheinmetall Suffers Another Cyberattack – Company Operations Still Functional
Rheinmetall, a leading German armaments and technology company, was targeted by a cyberattack over the weekend. The attack, however, did not affect company operations, according to officials....
Microsoft: Iranian hackers behind retaliatory cyberattacks on US orgs
Microsoft has discovered that an Iranian hacking group known as ‘Mint Sandstorm’ is conducting cyberattacks on US critical infrastructure in what is believed to be retaliation...



























