Treading Water: The Struggle Against Third-Party Vulnerabilities and How True Automation Can Help.By Dan Richings – Senior Vice President, Global Presales, Solutions Engineering, and Support –...
Friday Squid Blogging: Giant Squid vs. Blue Marlin
Friday Squid Blogging: Giant Squid vs. Blue MarlinEpic matchup. As usual, you can also use this squid post to talk about the security stories in the...
German Police Raid DDoS-Friendly Host ‘FlyHosting’
German Police Raid DDoS-Friendly Host ‘FlyHosting’Authorities in Germany this week seized Internet servers that powered FlyHosting, a dark web offering that catered to cybercriminals operating DDoS-for-hire...
From Workshops to Leader Panels: A Recap of Women’s History Month at McAfee
From Workshops to Leader Panels: A Recap of Women’s History Month at McAfee From Workshops to Leader Panels: A Recap of Women’s History Month at McAfee...
Preventing and Detecting Attacks Involving 3CX Desktop App
Preventing and Detecting Attacks Involving 3CX Desktop AppIn this blog entry, we provide technical details and analysis on the 3CX attacks as they happen. We also...
S4x23 Review Part 4: Cybersecurity for Industrial IoT
S4x23 Review Part 4: Cybersecurity for Industrial IoTIn this fourth article, I introduce the discussion related to Industrial IoT, that is involved challenges to adopt cybersecurity...
Study: Women in cybersecurity feel excluded, disrespected
Study: Women in cybersecurity feel excluded, disrespectedFeelings of exclusion and being disrespected impacts hiring opportunities and retention for women, according to a new report. The post...
15 million public-facing services vulnerable to CISA KEV flaws
15 million public-facing services vulnerable to CISA KEV flawsOver 15 million publicly facing services are susceptible to at least one of the 896 vulnerabilities listed in...
Twitter open-sources recommendation algorithm code
Twitter open-sources recommendation algorithm codeTwitter announced on Friday that it's open-sourcing the code behind the recommendation algorithm the platform uses to select the contents of the...
Artificial intelligence: A double-edged sword for technology & ethics
Artificial intelligence: A double-edged sword for technology & ethicsPål (Paul) has more than 30 years of experience from the IT industry and has worked with both...
Subprime Lender TitleMax Hit With Hacking Incident
Subprime Lender TitleMax Hit With Hacking IncidentPersonal, and Potentially Financial Data Exposed in 'Contained' IncidentThe parent company of subprime lender TitleMax says hackers made off the...
SEC Eyes Final Rules on Incident Disclosure, Board Expertise
SEC Eyes Final Rules on Incident Disclosure, Board ExpertiseOne Rule Would Force Firms to Disclose 'Material Cybersecurity Incidents' in 4 DaysRules coming in April could require...
Evolving AlienFox Malware Steals Cloud Services Credentials
Evolving AlienFox Malware Steals Cloud Services CredentialsAttackers Use Toolkit to Harvest API Keys and Secrets From 18 Cloud ProvidersHackers have used a modular toolkit called "AlienFox'"...
Ukrainian Cops Bust Phishing Group That Stole $4.3 Million
Ukrainian Cops Bust Phishing Group That Stole $4.3 MillionFruadsters Used Fake E-Commerce Websites to Swindle VictimsThe Ukrainian law enforcement busted a transnational group of scammers that...
Investigadores detallan la grave vulnerabilidad «Super FabriXss» en Microsoft Azure SFX
Investigadores detallan la grave vulnerabilidad «Super FabriXss» en Microsoft Azure SFXHan surgido detalles sobre una vulnerabilidad ahora parcheada en Azure Service Fabric Explorer ( SFX )...
Dark Power, nuevo ransomware activo
Dark Power, nuevo ransomware activoHa aparecido una nueva operación de ransomware llamada «Dark Power», y ya ha enumerado a sus primeras víctimas en un […]Read MoreBlog...
15 millones de servicios públicos vulnerables a fallas CISA KEV
15 millones de servicios públicos vulnerables a fallas CISA KEVMás de 15 millones de servicios públicos son susceptibles a al menos una de las 896 vulnerabilidades...
Cybersecurity Insights with Contrast CISO David Lindner | 3/31
Cybersecurity Insights with Contrast CISO David Lindner | 3/31 Insight #1 " Microsoft Security Copilot, a generative AI approach to helping secure your systems was announced...
3CX VoIP Desktop Application Supply Chain Attack
3CX VoIP Desktop Application Supply Chain AttackThreat Summary The 3CX DesktopApp is a voice and video conferencing software developed by 3CX – a widely used application,...
Post-Conference Tech Spec: Why Building Your Ship (Application) with Raw Materials is a Bad Idea
Post-Conference Tech Spec: Why Building Your Ship (Application) with Raw Materials is a Bad Idea The post Post-Conference Tech Spec: Why Building Your Ship (Application)...
Italian privacy regulator bans ChatGPT over collection, storage of personal data
Italian privacy regulator bans ChatGPT over collection, storage of personal dataItaly’s data privacy regulator has banned ChatGPT over alleged privacy violations relating to the chatbot’s collection...
Spyware vendors use exploit chains to take advantage of patch delays in mobile ecosystem
Spyware vendors use exploit chains to take advantage of patch delays in mobile ecosystemSeveral commercial spyware vendors developed and used zero-day exploits against iOS and Android...
ESET Research Podcast: A year of fighting rockets, soldiers, and wipers in Ukraine
ESET Research Podcast: A year of fighting rockets, soldiers, and wipers in UkraineESET experts share their insights on the cyber-elements of the first year of the war...
World Backup Day: Avoiding a data disaster is a forever topic
World Backup Day: Avoiding a data disaster is a forever topic By failing to prepare you are preparing to fail. Make sure you're able to bounce back...
Ukrainian Police Bust Multimillion-Dollar Phishing Gang
Ukrainian Police Bust Multimillion-Dollar Phishing GangMore than 100 sites created to lure European victimsRead MoreMore than 100 sites created to lure European victims
GCHQ Updates Security Guidance for Boards
GCHQ Updates Security Guidance for BoardsAgency wants business leaders to get serious about cyberRead MoreAgency wants business leaders to get serious about cyber
UK Regulator: HIV Data Protection Must Improve
UK Regulator: HIV Data Protection Must ImproveICO issues call after reprimanding NHS HighlandRead MoreICO issues call after reprimanding NHS Highland
New Azure Flaw “Super FabriXss” Enables Remote Code Execution Attacks
New Azure Flaw "Super FabriXss" Enables Remote Code Execution AttacksThe cross-site scripting flaw affects SFX version 9.1.1436.9590 or earlier and has a CVSS of 8.2Read MoreThe...
Modular “AlienFox” Toolkit Used to Steal Cloud Service Credentials
Modular "AlienFox" Toolkit Used to Steal Cloud Service CredentialsHarvesting API keys and secrets from AWS SES, Microsoft Office 365 and other servicesRead MoreHarvesting API keys and...
Italy’s Privacy Watchdog Blocks ChatGPT Amid Privacy Concerns
Italy's Privacy Watchdog Blocks ChatGPT Amid Privacy ConcernsGPDP probe is due to allegations that ChatGPT failed to comply with data collection rulesRead MoreGPDP probe is due...




























