The Biden administration today issued its vision for beefing up the nation’s collective cybersecurity posture, including calls for legislation establishing liability for software products and services...
Russian Cyberwarfare Documents Leaked
Now this is interesting: Thousands of pages of secret documents reveal how Vulkan’s engineers have worked for Russian military and intelligence agencies to support hacking operations,...
The Security Vulnerabilities of Message Interoperability
Jenny Blessing and Ross Anderson have evaluated the security of systems designed to allow the various Internet messaging platforms to interoperate with each other: The Digital...
Security Vulnerabilities in Snipping Tools
HomeBlog Comments Clive Robinson • March 28, 2023 10:50 AM @ Bruce, ALL, “… have vulnerabilities that allow people to partially recover content that was edited...
Hacks at Pwn2Own Vancouver 2023
An impressive array of hacks were demonstrated at the first day of the Pwn2Own conference in Vancouver: On the first day of Pwn2Own Vancouver 2023, security...
Friday Squid Blogging: Creating Batteries Out of Squid Cells
This is fascinating: “When a squid ends up chipping what’s called its ring tooth, which is the nail underneath its tentacle, it needs to regrow that...
A Hacker’s Mind News
HomeBlog A Hacker’s Mind News My latest book continues to sell well. Its ranking hovers between 1,500 and 2,000 on Amazon. It’s been spied in airports....
Exploding USB Sticks
Exploding USB Sticks In case you don’t have enough to worry about, people are hiding explosives—actual ones—in USB sticks: In the port city of Guayaquil, journalist...
Mass Ransomware Attack
Mass Ransomware Attack A vulnerability in a popular data transfer tool has resulted in a mass ransomware attack: TechCrunch has learned of dozens of organizations that...
ChatGPT Privacy Flaw
HomeBlog Comments Michael • March 22, 2023 10:21 AM The tweet which asks “Have you been hacked?”, it is a little suspicious that this happens about...
Hack the Pentagon website promotes the benefits of bug bounties to US Military
Graham Cluley is an award-winning security blogger, researcher and public speaker. He has been working in the computer security industry since the early 1990s. View all...
Clipboard-injecting malware disguises itself as Tor browser, steals cryptocurrency
Imagine you live in Russia and want to use the Tor browser to anonymise your browsing of the web. There’s a problem. Many people in Russia...
US sends million-dollar scammer to prison for four years
Graham Cluley is an award-winning security blogger, researcher and public speaker. He has been working in the computer security industry since the early 1990s. View all...
Smashing Security podcast #315: Crypto hacker hijinks, government spyware, and Utah social media shocker
A cryptocurrency hack leads us down a maze of twisty little passages, Joe Biden’s commercial spyware bill, and Utah gets tough on social media sites. All...
UK police reveal they are running fake DDoS-for-hire sites to collect details on cybercriminals
Graham Cluley is an award-winning security blogger, researcher and public speaker. He has been working in the computer security industry since the early 1990s. View all...
Can zero trust be saved?
Graham Cluley Security News is sponsored this week by the folks at Kolide. Thanks to the great team there for their support! Right now, “Zero Trust”...
Danger USB! Journalists sent exploding flash drives
Graham Cluley is an award-winning security blogger, researcher and public speaker. He has been working in the computer security industry since the early 1990s. View all...
Europe’s transport sector terrorised by ransomware, data theft, and denial-of-service attacks
A new report from ENISA, the European Union Agency for Cybersecurity, looking at cyberattacks targeting the European transport network over a period of almost two years,...
Fake GPT Chrome extension steals Facebook session cookies, breaks into accounts
The world has gone ChatGPT bonkers. Just about everyone is talking about it, and if you’re not talking about it then that’s because you’re too busy...
Smashing Security podcast #314: Photo cropping bombshell, TikTok debates, and real estate scams
It could be a case of aCropalypse now for Google Pixel users, there’s a warning for house buyers, and just why is TikTok being singled out...
Hack the Pentagon website promotes the benefits of bug bounties to US Military
Graham Cluley is an award-winning security blogger, researcher and public speaker. He has been working in the computer security industry since the early 1990s. View all...
Treading Water: The Struggle Against Third-Party Vulnerabilities and How True Automation Can Help.
By Dan Richings – Senior Vice President, Global Presales, Solutions Engineering, and Support – Adaptiva Using third-party software is unavoidable in today’s market. The competition and...
As Cyber Attacks Target Large Corporates, Teams Need to Evolve Data Security
By Karthikeyan Mariappan, VP of Engineering, Titaniam Chief information security officers (CISOs) and their teams zealously study attack data to determine how adversaries’ strategies are changing...
Security leaders are finally getting a seat at the table with corporate leadership – make good use of your time there
Looking to automation, engaging offensive security, and making the business case for building a robust cybersecurity strategy will help security leaders mature their program By Robert...
Next Generation Cybersecurity for Small to Midsize Businesses
How Cynet is giving lean security teams the tools they need to protect their business as budget crunches and reduced headcounts put many companies at risk...
Eight Tips for CISOs Trying Get Their Board on Board
By Ori Arbel, CTO, CYREBRO Nobody likes to be misunderstood, least of all C-level executives who play a key role in strategic decision-making in enterprises. Yet...
Zero Trust in a DevOps World
By Joel Krooswyk, Federal CTO, GitLab Inc. Although zero trust may seem like an overused buzzword, the approach is critical to securing people, devices, infrastructure, and...
Solving Cybersecurity Problems Arising in “Difficult Environments of High Uncertainty.”
By James Hess, CEO of Unknown Cyber Cybersecurity is a critical issue that affects organizations of all sizes and industries, but it can be particularly challenging...
Why Tackling Financial Crime Calls for A Privacy-First Approach
By Dr. Alon Kaufman, CEO and Co-Founder of Duality Technologies To gain the upper hand in the fight against financial crime, banks and other financial institutions...
Remaining Proactive at Identifying Risks Keeps You Ahead of Hackers
By Carl Torrence, Content Marketer at Marketing Digest Why is cybersecurity such a big issue in organizations all over the world? It’s simple — Data breaches...



























