MIAMI, April 12, 2023 /PRNewswire/ — Network Assured has reported that data leaks, phishing scams and malware infections attributable to ChatGPT are on the rise. The report tracks the most...
(ISC)² Certified in Cybersecurity Earns ANAB Accreditation to ISO 17024 and Surpasses 15,000 Certification Holders
ALEXANDRIA, Va., April 12, 2023 /PRNewswire/ — (ISC)² – the world’s largest nonprofit association of certified cybersecurity professionals – today announced that the (ISC)² Certified in Cybersecurity℠ certification has received accreditation...
Lazarus Group’s ‘DeathNote’ Cluster Pivots to Defense Sector
An operation within North Korea’s notorious Lazarus Group that initially focused solely on coin-mining attacks has begun targeting defense sector organizations around the world. The DeathNote...
When Banking Laws Don’t Protect Consumers From Cybertheft
Banking laws designed to protect Federal Deposit Insurance Corp. (FDIC)-insured accounts contain loopholes that strip consumers of coverage against certain cyberattacks. Less than a month before...
Opera Adds Free VPN to Opera for iOS
OSLO, Norway , April 12, 2023 /PRNewswire/ — Opera (NASDAQ: OPRA) – the company behind the award-winning family of web browsers – is announcing the extension of its free browser...
FBI & FCC Warn on ‘Juice Jacking’ at Public Chargers, but What’s the Risk?
US government agencies are warning that malware planted in public charging stations for phones and other electronics can sneak onto your device when you least expect...
Survey Findings Show Link Between Data Silos and Security Vulnerabilities
What are the consequences of operating your business with risk and compliance data in silos? Turns out, it might be more impactful than you think. A...
HHS Wants HIPAA Changes to Protect Reproductive Health Info
Governance & Risk Management , Healthcare , HIPAA/HITECH Proposed Rule Would Prohibit Certain PHI Disclosures, Uses for Law Enforcement Marianne Kolbasuk McGee (HealthInfoSec) • April 12,...
Will Generative AI’s Use in Cyber Tools Exceed Expectations?
Artificial Intelligence & Machine Learning , Cloud Security , Next-Generation Technologies & Secure Development To What Extent Will Security Tools Benefit From Linking Arms With OpenAI’s...
MY TAKE: Putin’s weaponizing of ransomware shows why network security needs an overhaul
At 10 am PDT, next Wednesday, April 19th, I’ll have the privilege of appearing as a special guest panelist and spotlight speaker on Virtual Guardian’s monthly...
DDoS attacks shifting to VPS infrastructure for increased power
Hyper-volumetric DDoS (distributed denial of service) attacks in the first quarter of 2023 have shifted from relying on compromised IoT devices to leveraging breached Virtual Private...
Reddit is down, not loading content for mobile app users
Reddit is investigating a worldwide outage that prevents users from accessing the social network’s website on mobile apps. Users are reporting being automatically logged out when opening...
Kyocera Android app with 1M installs can be abused to drop malware
A Kyocera Android printing app is vulnerable to improper intent handling, allowing other malicious applications to abuse the flaw to download and potentially install malware on devices....
Windows admins warned to patch critical MSMQ QueueJumper bug
Security researchers and experts warn of a critical vulnerability in the Windows Message Queuing (MSMQ) middleware service patched by Microsoft during this month’s Patch Tuesday and...
Microsoft shares guidance to detect BlackLotus UEFI bootkit attacks
Microsoft has shared guidance to help organizations check if hackers targeted or compromised machines with the BlackLotus UEFI bootkit by exploiting the CVE-2022-21894 vulnerability. Organizations and...
Hyundai data breach exposes owner details in France and Italy
Hyundai has disclosed a data breach impacting Italian and French car owners and those who booked a test drive, warning that hackers gained access to personal...
How to Secure Web Applications in a Growing Digital Attack Surface
External web applications can prove difficult to secure and are often targeted by hackers due to the range of vulnerabilities they may contain. These risks, which...
Microsoft Bing introduces ChatGPT answers in search results
Microsoft has introduced a new update to Bing.com that includes a significant change in its search results — the addition of ChatGPT responses to search queries....
Microsoft (& Apple) Patch Tuesday, April 2023 Edition
Microsoft today released software updates to plug 100 security holes in its Windows operating systems and other software, including a zero-day vulnerability that is already being...
KFC owner suffers data breach following ransomware attack
Note: This article was updated on April 12, 2023, to reflect the fact that employee data, not customer data, was accessed during the cyber attack against...
10 Free & Open-Source Threat-Hunting Tools for 2023
Are you on the lookout for threat-hunting tools? If so, you’ve come to the right place. Compared to network security systems that include appliances such as...
Patch Tuesday April 2023 – Microsoft Publishes Fixes for 17 Known Vulnerabilities
Heimdal® returns with the Easter edition of our Patch Tuesday series with more news from the vulnerability management front. Throughout April, Microsoft has launched 17 security...
Google Cloud offers Assured Open Source Software for free
Image: Google Open source software and software supply chain security risks continue to be a primary concern for developers and organizations. According to a 2022 study...
Cybersecurity leaders see risk from email attacks, hybrid work
on April 12, 2023, 6:17 PM EDT Cybersecurity leaders see risk from email attacks, hybrid work Graymail, phishing, vendor impersonation, and other BECs clogging up security...
TechRepublic Premium editorial calendar: IT policies, checklists, toolkits and research for download
on April 12, 2023, 4:47 PM EDT TechRepublic Premium editorial calendar: IT policies, checklists, toolkits and research for download TechRepublic Premium content helps you solve your...
As the west tries to limit TikTok’s reach, what about China’s other apps?
As TikTok, the world’s most popular app, comes under increasing scrutiny in response to data privacy and security concerns, lawmakers in the west may soon set...
Data on 400K Kodi Forum Members Stolen and Put Up for Sale
The Kodi forum (MyBB) is a place where about 400,000 users of the Kodi open source media player come together to share tips on customizing their...
Microsoft: NSO Group-Like ‘QuaDream’ Actor Selling Mobile Spyware to Governments
Microsoft has identified another Israel-based threat organization, similar to NSO Group, that is selling mobile spyware and other cyber espionage tools and services to international governments...
10 things to look out for when buying a password manager
Here’s how to choose the right password vault for you and what exactly to consider when weighing your options 11 Apr 2023 – 11:30AM Here’s how...
LastPass Breach Reveals Important Lessons
The LastPass breach will be remembered as paradigmatic. The blast radius from this August 2022 breach grew from bad to catastrophic during a six-month period. Initially,...





























