With Data Privacy Day coming up, we spoke to cybersecurity industry experts about the latest data privacy trends… Allon Mureinik, senior manager, software engineering at the Synopsys Software Integrity Group: “In today’s world of social media and open-source development, sharing…
Category: EN
Data Privacy Day 2024: Part 2
With Data Privacy Day coming up, we spoke to cybersecurity industry experts about the latest data privacy trends… Alex Hazell, Head of Legal and Privacy for Acxiom EMEA, says: “In 2024, we can no longer discuss data privacy without talking…
Microsoft says Russian hackers also targeted other organizations
On Friday, Microsoft revealed that it had been the victim of a hack carried out by Russian government spies. Now, a week later, the technology giant said that it was not the only target of the espionage operation. In a…
Nineteen Group acquires SASIG
Today, the award-winning Nineteen Group, who runs a number of industry events and exhibitions such as the International Cyber Expo, has announced that it has acquired The Security Awareness Special Interest Group (SASIG), a networking and thought leadership forum for…
Ransomware Roundup – Albabat
The financially motivated Albabat ransomware began distributing as a rogue program in late 2023, and has since evolved. Learn more. This article has been indexed from Fortinet Threat Research Blog Read the original article: Ransomware Roundup – Albabat
How Datawiza uses Microsoft Entra ID to help universities simplify access
Datawiza helps Claremont Graduate University enable Microsoft Entra ID multifactor authentication and single sign-on for Oracle PeopleSoft, streamling and improving the student experience. The post How Datawiza uses Microsoft Entra ID to help universities simplify access appeared first on Microsoft…
UK CMA Opens Antitrust Investigation Of Vodafone, Three Merger
Competition and Markets Authority (CMA) begins Phase 1 investigation of Vodafone UK’s merger with Three UK This article has been indexed from Silicon UK Read the original article: UK CMA Opens Antitrust Investigation Of Vodafone, Three Merger
Russian TrickBot Malware Developer Pleaded Guilty
Vladimir Dunaev, a resident of Amur Blast and aged 40, has confessed to creating and distributing Trickbot malware. The purpose of the malware was to launch cyberattacks against various American hospitals and companies. Trickbot has a collection of malware tools…
Guess the company: Takes your DNA, blames you when criminals steal it, can’t spot a cyberattack for 5 months
Breach filings show Reddit post led to the discovery rather than any sophisticated cyber defenses Biotech and DNA-collection biz 23andMe, the one that blamed its own customers for the October mega-breach, just admitted it failed to detect any malicious activity…
digital forensics and incident response (DFIR)
This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Security Resources and Information from TechTarget Read the original article: digital forensics and incident response (DFIR)
How a mistakenly published password exposed Mercedes-Benz source code
Mercedes-Benz accidentally exposed a trove of internal data after leaving a private key online that gave “unrestricted access” to the company’s source code, according to the security research firm that discovered it. Shubham Mittal, co-founder and chief technology officer of…
Major Water Suppliers Hit by Ransomware Attacks
Recent ransomware attacks have impacted two major water supply systems in the United States and the United Kingdom, with Boston-based Veolia North America and England’s Southern Water falling victim to cyber threats. In both instances, attackers have reportedly seized…
Ukraine Arrests Hacker for Assisting Russian Missile Strikes
Ukraine’s security services said that the IT specialist from Kharkiv targeted government websites and provided intelligence to Russia to carry out missile strikes This article has been indexed from www.infosecurity-magazine.com Read the original article: Ukraine Arrests Hacker for Assisting Russian…
Guidance: Assembling a Group of Products for SBOM
Today, CISA published Guidance on Assembling a Group of Products created by the Software Bill of Materials (SBOM) Tooling & Implementation Working Group, one of the five SBOM community-driven workstreams facilitated by CISA. CISA’s community-driven working groups publish documents and reports to…
In Other News: Secure Use of AI, HHS Hacking, CISA Director Swatting
Noteworthy stories that might have slipped under the radar: guidance on secure use of AI, HHS grant money stolen by hackers, CISA director target of swatting. The post In Other News: Secure Use of AI, HHS Hacking, CISA Director Swatting…
QR Code Scammers are Changing Tactics to Evade Detection
Check Point researchers last year saw a 587% increase between August and September of phishing attacks enticing unsuspecting targets to click on QR codes that then redirect them to malicious pages used for harvesting credentials. The cybersecurity firm’s report was…
Hackers Drain Wallets via Cracked macOS Apps using Scripts Accessed From DNS Records
Hackers have found another clever way to transfer information-stealing malware to macOS users, apparently through DNS records that could hide malicious scripts. The attack is being targeted to macOS Ventura and later, depending on the vulnerable applications repackaged as PKG…
Enhanced Security Alert: Setting Up Stolen Device Protection on iOS 17.3
It has been announced that Apple has released iOS 17.3, the latest version of its iPhone operating system. This new version has several important new features, including Stolen Device Protection, which provides users with additional security measures if their…
Web Vulnerability Submissions Exploded in 2023
There was an alarming surge of user-submitted web vulnerability submissions in 2023—with a 30% increase compared to 2022—as open-scoped bug bounty programs evolved. The post Web Vulnerability Submissions Exploded in 2023 appeared first on Security Boulevard. This article has been…
Why We Need to Cultivate a Confidential Computing Ecosystem
The development of privacy-enhancing technologies (PETs) can resolve the tension between data privacy and utility. The post Why We Need to Cultivate a Confidential Computing Ecosystem appeared first on Security Boulevard. This article has been indexed from Security Boulevard Read…