-
The Pentagon wants to prevent personnel data tracking, breaches
-
NIST’s supply chain security guidance tells agencies to look to FedRAMP
-
EV charging station map highlights infrastructure disparities
-
How the thriving fraud industry within Facebook attacks independent media
-
One year removed from the Colonial Pipeline attack, what have we learned?
-
Scammer Infects His Own Machine with Spyware, Reveals True Identity
-
What We’ve Learned in the 12 Months Since the Colonial Pipeline Attack
-
Expert Advice On Colonial Pipeline Ransomware Attack Anniversary
-
Cryptocurrency laundromat Blender shredded by US Treasury in sanctions first
-
White House Moves to Shore Up US Post-Quantum Cryptography Posture
-
QNAP fixes multiple flaws, including a QVR RCE vulnerability
-
USB-based Wormable Raspberry Robin Malware Targeting Windows Installer
-
Expert Advise On Colonial Pipeline Ransomware Attack Anniversary
-
AT&T Expands Access to Advanced Secure Edge and Remote Workforce Capabilities
-
The Declaration for the Future of the Internet Is for Wavering Democracies, Not China and Russia
-
Britain’s National Health Service Hit by Massive Phishing Campaign
-
As data privacy laws expand, businesses must employ protection methods
-
Austin becomes the first Texas city to experiment with ‘guaranteed income’
-
You didn’t leave enough space between ROSE and AND, and AND and CROWN
-
DDoS Attacks by Hacktivists Disrupted Russian Alcohol Supply Chain
-
DOD-VA health record modernization not hitting interoperability targets, watchdogs say
-
6 in 10 Americans would quit current job for remote position
-
Data breach Discovered at IKEA Canada impacts 95,000 Customers
-
Cloudflare Appoints Carlos Torales Montero as VP, Head of Sales Latin America
-
Frontdoor Announces First-Quarter 2022 Revenue Increased 7 Percent to $351 Million
-
Adlumin Expands Executive Leadership Team with Two Industry Experts
-
Steer clear of these Instagram “Get rich with Bitcoin” scams
-
Killnet Hacking group of Russia pledges to disrupt ventilators across UK Hospitals
-
How Microsoft will publish info to comply with executive order on software bill of materials
-
WooCommerce Credit Card Stealer Found Implanted in Fake Images
-
Nvidia Charged By SEC For ‘Inadequate Disclosures’ About Crypto Mining
-
Man Arrested For Fake Facebook Page Loses Civil Suit Against Police
-
Catalans Demand Answers After Spanish Spy Chief Confirms Phone Hacking
-
German Government Touts $14.7bn State Aid For Chip Factories
-
Raspberry Robin – A a Windows Malware Spreads Using External USB Drives
-
Anonymous and Ukraine IT Army continue to target Russian entities
-
Google, Microsoft and Apple commit to passwordless sign-in standard
-
The Growing Danger of Data Exfiltration by Third-Party Web Scripts
-
NetDooka framework distributed via a pay-per-install (PPI) malware service
-
Help! I have 100,000 unread messages in my Gmail inbox. Where do I even start? [Ask ZDNet]
-
Security researchers: Here’s how the Lazarus hackers start their attacks
-
China Not Happy With South Korea Joining NATO Cyber Defense Center
-
GoBrut Botnet Targets Sites and Devices: Heimdal Security Report
-
NIST Releases Advisory Guide on Supply Chain Attack Protection
-
Impact of Alexa Ranking Service Shutdown on Cybersecurity Industry
-
Researchers Warn of ‘Raspberry Robin’ Malware Spreading via External Drives
-
Corporate Involvement in International Cybersecurity Treaties
-
Killnet Threatens To Shut Down Hospital Ventilators, After London Arrest
-
White House warns of cryptography-cracking quantum computers
-
Vulnerable Docker Installations Are A Playhouse for Malware Attacks
-
NIST updates guidance for cybersecurity supply chain risk management
-
Special Police Constable Used Encrypted Chat to Post Child Abuse Content
-
Hackers Using PrivateLoader PPI Service to Distribute New NetDooka Malware
-
Biometrics: Powerful, but if handled improperly, very dangerous.
-
Microsoft, Apple and Google Team Up on Passwordless Standard
-
Conti, REvil, LockBit Ransomware Flaws Exploited to Block Encryption
-
Attackers are Employing Multiple Malwares to Target Ukrainian System
-
Experts Uncover New Espionage Attacks by Chinese ‘Mustang Panda’ Hackers
-
Ukraine IT Army hit EGAIS portal impacting Russia’s alcohol distribution
-
Bank for International Settlements calls for reform of data governance
-
Deepfake threats: Risk of false electronic evidence, extortion
-
Wipro earns Microsoft Cloud Security Specialization certification
-
Microsoft says to ditch passwords all together on World Password Day
-
Critical Cisco NFVIS Software Flaw Let Attacker Injects Commands at The Root Level
-
Google Releases Android Update to Patch Actively Exploited Vulnerability
-
South Korea becomes first Asian member of NATO cyber research centre
-
May 2022 Patch Tuesday forecast: Look beyond just application and OS updates
-
Smart government agencies are opting for multicloud environments
-
Heroku fesses up to customer password theft due to OAuth token attack
-
Nothing personal: Training employees to identify a spear phishing attack
-
AuditBoard introduces enhanced automation capabilities to accelerate compliance management
-
Exterro upgrades FTK Connect to enhance digital forensic and incident response automation
-
WALLIX PAM4ALL offers protection for user access and workstations
-
F5, Cisco admins: Stop what you’re doing and check if you need to install these patches
-
AST Extends 2022 ‘ASTORS’ Early Entry Discount – by Popular Demand
-
WhatsApp to roll out larger file size sharing, bigger groups, and new reactions feature
-
Sternum integrates with Kibana and Grafana to enhance IoT protection
-
Mphasis partners with Securonix to prepare customers against advanced cyber security risks
-
Apple, Google and Microsoft expand support for FIDO Alliance’s passwordless sign-in standard
-
Rambus acquires Hardent to address customer needs for next-generation data center solutions
-
T-Mobile and Cradlepoint join forces to provide businesses with 5G fixed wireless internet solutions
-
Citrix partners with Google Cloud to enable secure remote work for customers
-
Onapsis collaborates with NextGen Cyber Talent to address the cybersecurity talent shortage
-
Immuta expands partnership with Starburst to scale secure data access through automation
-
Sentry raises $90 million to drive adoption of application performance monitoring
-
Magnet Forensics acquires Comae Technologies to continue developing the memory analysis platform
-
Microsoft, Apple, and Google Promise to Expand Passwordless Features
-
Arcanna.ai assembles a team of advisors and security professionals
-
Tailscale raises $100 million to help enterprises eliminate connectivity problems
-
Google, Apple, Microsoft promise end to passwords, courtesy of your mobile phone
-
Heroku: Cyberattacker Used Stolen OAuth Tokens to Steal Customer Account Credentials
-
CIA Wants Russians to Share Secret Info with the Agency via its Darknet Site
-
HBCUs could be one key to improving equity in federal contracting and technology
-
NIST Issues Guidance for Addressing Software Supply-Chain Risk
-
Google addresses actively exploited Android flaw in the kernel
-
EU Antitrust Head Calls For Global Approach To Tackle Big Tech
-
Why rural communities struggle to bring in much-needed federal grants
-
Microsoft, Apple, Google accelerate push to eliminate passwords
-
Cisco Releases Security Updates for Enterprise NFV Infrastructure Software
-
Cisco Releases Security Updates for Enterprise NFV Infrastructure Software
-
India to Collect User Data from VPNs, Data Centers, and Cloud Service Providers
-
Magnet Forensics Acquires Cybersecurity Software Firm Comae Technologies
-
Avast Patches Decades Old Vulnerabilities In Antivirus Product
-
Stung By 3 Court Losses, ISPs Stop Fighting California’s Net Neutrality Law
-
India to Collect User Data from VPNs, Crypto, Data Centers, and Cloud Service Providers
-
Modern Identity and Access Management Makes a Difference, Especially at a Mega-Scale
-
Cisco Announces Cloud Controls Framework Is Now Available to Public
-
World Password Day: Why are passwords still a problem in 2022?
-
Report: Cybersecurity workforce must grow by two-thirds to protect assets
-
It’s World Password Day! Here’s the one simple tip you need to keep your accounts secure online
-
Multichannel Phishing Concerns Cybersecurity Leaders in 2022
-
X-Force Research Update: Top 10 Cybersecurity Vulnerabilities of 2021
-
US VP Kamala Harris To Meet Amazon Labor Union At White House
-
Cisco adds predictive networking SaaS options to improve uptime and security
-
White House: Quantum computers could crack encryption, so here’s what we need to do
-
FBI: Email fraud keeps getting worse. Here’s how to protect yourself
-
1,000+ Attacks in 2 Years: How the SideWinder APT Sheds Its Skin
-
Nigerian Tesla: 419 scammer gone malware distributor unmasked
-
Chinese State-Sponsored APT Naikon Resurfaces with New Tactics, Techniques, and Procedures (TTPs).
-
Google fixes two critical Pixel vulnerabilities: Get your updates when you can!
-
NSA chief: Cyber Command did 9 international missions last year
-
$43 billion stolen through Business Email Compromise since 2016, reports FBI
-
S3 Ep81: Passwords (still with us!), Github, Firefox at 100, and network worms [Podcast]
-
Docker Under Siege: Cybercriminals Compromise Honeypots to Ramp Up Attacks
-
NIST Releases Updated Cybersecurity Guidance for Managing Supply Chain Risks
-
AvosLocker Ransomware Uses Driver Files to Disable Anti-Virus Solutions
-
Android’s May 2022 Security Updates Patch 36 Vulnerabilities
-
Google to Add Passwordless Authentication Support to Android and Chrome
-
A couple of 10-Year-Old flaws affect Avast and AVG antivirus
-
Google chases sovereignty market with EU Workspace Data product
-
AutoRABIT Raises $26 Million for Salesforce DevSecOps Platform
-
Forrester Report Reveals the 5 Benefits IT Teams Really Need from API Security Tools
-
Car Rental Giant Sixt Hit by Cyberattack, Operations Shut Down
-
Cloudflare Successfully Thwarted One of The Largest DDoS Attacks
-
Google unveils passwordless log-in plans on World Password Day
-
NSA chief: Cyber Command did 9 cyber defense missions last year
-
How Can Healthcare Keep a Stronger Lock Down on their Cybersecurity
-
F5 Warns of Critical Bug Allowing Remote Code Execution in BIG-IP Systems
-
Every ISP in the US Must Block These 3 Pirate Streaming Services
-
UK National Health Service Email Accounts Compromised by Hackers to Steal Microsoft Logins
-
This World Password Day consider ditching passwords altogether
-
NetDooka Framework Distributed via PrivateLoader Malware as Part of Pay-Per-Install Service
-
Announcing the public availability of the Cisco Cloud Controls Framework (CCF)
-
Researchers discover ‘dangerous functionality’ in Google Cloud control pane
-
Google, Apple, Microsoft make a new commitment for a “passwordless future”
-
Flaws in Avast, AVG Antiviruses Could Have Facilitated Attacks on Millions of Devices
-
Researchers Disclose 10-Year-Old Vulnerabilities in Avast and AVG Antivirus
-
Critical F5 BIG-IP flaw allows device takeover, patch ASAP! (CVE-2022-1388)
-
OpenSSF Launches Package Analysis Tool To Detect Malicious Packages
-
Check Point Software Outlines Five Must-Haves for Creating a Secure Password
-
There’s no sugarcoating it: That online sugar daddy may be a scammer
-
Thousands of Borrowers’ Data Exposed from ENCollect Debt Collection Service
-
Heroku Forces User Password Resets Following GitHub OAuth Token Theft
-
Cisco Patches Critical VM Escape in NFV Infrastructure Software
-
It’s time for Internet Providers to Become Primary Security Providers
-
Industry Groups Drop Challenge To California Net Neutrality Law
-
China stealing intellectual data from Europe and North America
-
Google is protecting Ukraine from State Sponsored Cyber Attacks of Russia
-
Multi-factor authentication: Busting a handful of common myths
-
ID theft tools small businesses should invest in 2022 – Tighten your security
-
VM escape and root access bugs fixed in Cisco NFV infrastructure software
-
Federal Court finds RI Advice failed to manage cybersecurity risks in landmark decision
-
Phishing operation hits NHS email accounts to harvest Microsoft credentials
-
Biden orders new quantum push to ensure encryption isn’t cracked by rivals
-
How the EPL tackles piracy and stops people going around the wall
-
Beijing-backed gang looted IP around the world for years, claims Cybereason
-
What Does Volunteering at (ISC)² Mean? Hear From Volunteer Lisa Vaughan
-
GitHub to require two factor authentication for code contributors by late 2023
-
7 threat detection challenges CISOs face and what they can do about it
-
Cisco Issues Patches for 3 New Flaws Affecting Enterprise NFVIS Software
-
F5 Warns of a New Critical BIG-IP Remote Code Execution Vulnerability
-
Building on Your Existing DAM Instance is Smart Budget Planning
-
Variscite enhances IoT and edge security with over-the-air software updates
-
BIO-key MobileAuth enhancements safeguard access to critical data
-
Uptycs helps security teams strengthen security posture with CIEM capabilities
-
Veracode Continuous Software Security Platform enables organizations to mitigate their security risk
-
World Password Day – the 1960s just called and gave you your passwords back
-
Syniti Migrate optimizes data migration for enterprise customers
-
Elastic Observability 8.2 provides fine-grain control over data collection and storage
-
Atos partners with VMware to help organizations drive value from data
-
Binarly collaborates with immune to secure modern computer infrastructure
-
Votiro partners with Thales to strengthen zero trust security for enterprises
Generated on 2022-05-06 23:55:34.846637