-
Breach of Washington State Database May Expose Personal Information
-
Bug Bounty Hunter Finds Google Drive Integration Vulnerability
-
CISA Issues Warning to Federal Agencies Regarding Actively Exploited Windows Flaw
-
Microsoft: Russian FSB Hackers Compromising Ukraine Since October
-
Forged Kubernetes Apps is used to Extract Sensitive Data from Argo CD Setups
-
Gurman: Apple Event on March 8, At Least Four M2 Macs to Launch Later This Year
-
Argo CD flaw could allow stealing sensitive data from Kubernetes Apps
-
$4.4 million stolen in attack on blockchain infrastructure Meter
-
Attackers Gained Access to the Systems of the National Games of China
-
Swissport Ransomware Attack Delays Flights, Disturbs Operations
-
Week in review: Samba vulnerability, phishing kits bypassing MFA, Patch Tuesday forecast
-
New Argo CD Bug Could Let Hackers Steal Secret Info from Kubernetes Apps
-
Convergint acquires Dramis Communications Solutions to expand direct service coverage in Canada
-
Noetic Cyber expands its leadership team with 3 key executive hires
-
LockBit ransomware gang claims to have stolen data from PayBito crypto exchange
-
Convergint Announces Acquisition of Dramis Communications Solutions Ltd.
-
LockBit ransomware gang claims PayBito crypto exchange as new victim
-
Top Stories: March 8 Apple Event, New iMac Pro Rumors, Universal Control vs. Sidecar, and More
-
Fortune 500 service provider says ransomware attack led to leak of more than 500k SSNs
-
Threat actors are Looking for Ways to Bypass MFA with Evolving Phishing Kits
-
CISA orders federal agencies to fix actively exploited CVE-2022-21882 Windows flaw
-
Microsoft Uncovers New Details of Russian Hacking Campaign Targeting Ukraine
-
Durov Suspected WhatsApp of Intentionally Introducing Vulnerabilities
-
Critical Flaws in Cisco Small Business Routers let Attackers Execute Arbitrary code
-
Box expands Slack integration to increase security and improve productivity
-
‘Very concerning’: Cisco router vulnerabilities bring broad risks
-
Think before you scan: How fraudsters can exploit QR codes to steal money
-
Mozilla adds four privacy-centric orgs to Data Futures Lab, awards each with $100,000
-
Senate Commerce Committee is Letting Big Telecom Hamstring the FCC
-
How to Protect Cloud Workloads from Zero-day Vulnerabilities
-
Microsoft discloses new details on Russian hacker group Gamaredon
-
Microsoft Defender for Endpoint now spots unpatched bugs in iOS and Android devices
-
Microsoft, Symantec Share Notes on Russian Hacks Hitting Ukraine
-
Over 500,000 people were impacted by a ransomware attack that hit Morley
-
AI Weekly: DeepMind’s AlphaCode, automatic age verification, and a new open language model
-
Republican senators demand briefing on IRS decision to require ID.me ‘selfies’
-
Suspected Chinese spies break into cloud accounts of News Corp journalists
-
Investment in data privacy in Brazil falls below global average
-
Ransomware attack hit Swissport International causing delays in flights
-
Intuit releases security notices, warns of phishing emails ahead of tax season
-
Argo CD Security Bug Opens Kubernetes Cloud Apps to Attackers
-
How Criminals Have Migrated Through Identity Theft and Privacy into Cyber Attacks
-
Wormhole cryptotrading company turns over $340,000,000 to criminals
-
BlackCat Ransomware Gang Employing Novel Techniques to Target Organizations
-
Text Message Scams: How to Recognize, Report and Restrict Them
-
News Corp reports January cyberattack targeting Wall Street Journal, New York Post, Dow Jones
-
Singapore urges shared responsibility in preventing online scams as it readies liability framework
-
#Enigma2022: Security’s Role in Helping HealthTech Find Its Way
-
Nintendo Wants Admitted Team Xecuter Pirate Jailed For Five Years
-
Apple’s $1.1 Billion Patent Dispute With Caltech Granted New Damages Trial
-
New iPad Air and iPhone SE Models With A15 Chip, 5G, and More Reportedly Enter Production
-
MacRumors Giveaway: Win a Tech Folio and Tech Pocket From WaterField Designs
-
China-Linked Group Attacked Taiwanese Financial Firms for 18 Months
-
Russia-Ukraine escalation of tensions: FBI calls for reports of uptick in cyber activit
-
IT Personnel Equally Susceptible to Phishing Attempts as the General Population
-
Cloud Threats: What Business Executives Need To Know Right Now
-
BotenaGo strikes again – malware source code uploaded to GitHub
-
Business Services Firm Morley Discloses Data Breach Affecting 500,000 People
-
Impacts from a new reality drive the need for an enhanced digital identity framework
-
As Part of Electoral Count Act Reform, Liberals Should Learn to Love Bush v. Gore
-
Strong authentication protects against phishing. So why aren’t more people using it?
-
Meet Nord Security: The company behind NordVPN wants to be your one-stop privacy suite
-
A nation-state actor hacked media and publishing giant News Corp
-
Edgescan partners with Manicode to revolutionise secure coding courses
-
Open-source Kubernetes tool Argo CD has a high-severity path traversal flaw: Patch now
-
ISO 27002 and Threat Intelligence: The New Security Standard
-
Russian APT Primitive Bear attacks Western gov’t department in Ukraine through job hunt
-
More companies are using multi-factor authentication. Hackers are looking for a way to beat it
-
Just-in-Time Access Explained. What It Means, Benefits and Best Practices of JIT
-
5 Reasons to Choose Duo Over Free Multi-Factor Authentication
-
Attackers Target Intuit Users by Threatening to Cancel Tax Accounts
-
The White House Memo on Adopting a Zero Trust Architecture: Top Four Tips
-
Retail giant Target open sources Merry Maker e-skimmer detection tool
-
Software Asset Management (SAM) – How It Can Benefit Your Company
-
FBI issues cybersecurity warnings to athletes at Winter Olympics in Beijing
-
US Accuses Russia of Disinformation Plot to Justify Invasion of Ukraine
-
Tech salaries, developer skills, cybersecurity, and more: ZDNet’s research roundup
-
Operation EmailThief: Zero-day XSS vulnerability in Zimbra email platform revealed
-
DHS Connects Government, Private Sector in New Cyber Safety Review Board
-
Top 9 Best Laptop for Adobe Creative Cloud 2022 – Photoshop, Illustrator
-
Another Israeli Firm, QuaDream, Caught Weaponizing iPhone Bug for Spyware
-
Russia-linked Gamaredon APT targeted a western government entity in Ukraine
-
Phishing kits that bypass MFA protection are growing in popularity
-
Apple to Collect 27% Commission on Third-Party App Payment Systems in the Netherlands
-
CISA issues advisory warning of critical vulnerabilities in Airspan Networks Mimosa
-
US Federal government creates cybersecurity incident review board
-
Amazon Set to Increase Prime Membership Fee By 17% for US Customers
-
Chinese Hackers Target Financial Institutions in Taiwan With Custom Backdoor
-
U.S. Authorities Charge 6 Indian Call Centers Scamming Thousands of Americans
-
Zimbra zero-day vulnerability actively exploited by an alleged Chinese threat actor
-
BATLOADER and Atera Agent are Being Distributed Through an SEO Poisoning Campaign
-
Russian Gamaredon Hackers Targeted ‘Western Government Entity’ in Ukraine
-
US Authorities Charge 6 Indian Call Centers Scamming Thousands of Americans
-
Cynet Log4Shell Webinar: A Thorough – And Clear – Explanation
-
Want your endpoint security product in the Microsoft Consumer Antivirus Providers for Windows ?
-
ESET Antivirus Flaw Let Attackers to Escalate Privileges & Execute Arbitrary Code
-
Microsoft blocked tens of billions of brute-force and phishing attacks in 2021
-
February 2022 Patch Tuesday forecast: A rough start for 2022
-
Trio of RCE CVSS 10 vulnerabilities among 15 CVEs in Cisco small business routers
-
CISA Warns of Critical Vulnerabilities Discovered in Airspan Networks Mimosa
-
Hackers Exploited 0-Day Vulnerability in Zimbra Email Platform to Spy on Users
-
Piracy is alive and well, demand reaching 3.7 billion unlicensed streams and downloads
-
New Cloud Security Alliance Survey Finds Uneven Adoption of Emerging Technologies
-
Lattice to Host Virtual Seminar on Anti-Fragile Security and Post-Quantum Cryptography in FPGAs
-
AT&T Cybersecurity Insights Report: Securing the Edge – Available today
-
Major vulnerability found in open source dev tool for Kubernetes
-
G-71 launches a new version of LeaksID to offer intellectual property protection
-
What Does an Internal Attack Resulting in a Data Breach Look Like in Today’s Threat Landscape?
-
HUMAN Bot Insights Services protects businesses from sophisticated bot attacks
-
Outseer Emerging Payments detects and prevents fraud in installment transactions
-
Tenable.cs updates enable organizations to detect and fix cloud infrastructure misconfigurations
-
JumpCloud expands cloud directory platform with patch management to improve device security
-
Aqua Security CNAPP features help security teams assess their cloud native security risk
-
FortiGate 3000F increases security and networking convergence across hybrid IT architectures
-
Teradata partners with Microsoft to modernize complex data analytics environments
-
Dialpad expands partnership with Google Cloud to centralize business communications
-
Axio joins with Cyber Risk Institute to improve cybersecurity resilience for financial institutions
-
That’s a signature move: How $320m in Ether was stolen from crypto biz Wormhole
-
Xerox acquires Powerland to strengthen IT services offerings in North America
-
Yellowbrick Data collaborates with NI+C to unlock data value for enterprises
-
Dialpad appoints Jim Nystrom and Kent Venook to key sales leadership roles
-
Cyberattack was attempted against a western government ‘entity’ in Ukraine, researchers say
-
White House creates board to review cybersecurity incidents, members to start with Log4J
-
Exclusive interview with the Powerful Greek Army (PGA) hacker group
-
Orca Cloud Risk Encyclopedia provides ongoing education for security practitioners
-
Zoho Workplace achieves substantial growth amidst the ongoing migration from competitor suites
-
ThycoticCentrify renamed Delinea to help solve modern privileged access challenges
-
NortonLifeLock sees growth in excess of 10% for revenues, net income in FY 2022 Q3
-
Fortinet beats Wall Street estimates for Q4, reports $3.34 billion in revenue for 2021
-
Mandiant Bolsters SaaS Platform With Integration of New Attack Surface Management Module
-
Research From Quantum and ESG Reveals Top Challenges in Data Management
-
Tenable Launches Suite of New Features to Cloud-Native Application Security Platform
-
San Francisco Should Strengthen, Not Gut, Surveillance Technology Ordinance
-
SHOP SAFE Will Stomp Out Online Sales of Used and Homemade Goods
-
A worrying Etsy listing reveals the stalking potential of Apple’s AirTags
-
Let’s go phishing: How we could enter a new era of email trust
-
DHS Launches Cyber Safety Review Board to Analyze Major Vulnerability Events
-
Privacy Shield: EU citizens might get right to challenge US access to their data
-
Great Resignation Increases Security Risks For Businesses, Warns Tessian
-
Facebook Suffers $10 Billion Loss Because Of Privacy Changes
-
The Chatter Podcast: The Olympics, Politics, and Security with Ethan Scheiner
-
Phishing kits’ use of man-in-the-middle reverse proxies is growing, warns Proofpoint
-
This book has an awful title, but says a lot of great things
-
Prosecutors investigating cyberattacks affecting multiple Belgian and Dutch ports
-
DOD’s testing chief wants cloud contracts to allow for more security checks
-
Conti gang hits KP Snacks with a crippling ransomware attack
-
Antlion APT group used a custom backdoor that allowed them to fly under the radar for months
-
JumpCloud joins the patch management crowd, starting with Windows and Mac updates
-
It’s Back: Senators Want EARN IT Bill to Scan All Online Messages
-
Intel expands Bug Bounty program with ‘Project Circuit Breaker’ effort
-
Wormhole Crypto Platform: ‘Funds Are Safe’ After $314M Heist
-
The state of AI ethics: The principles, the tools, the regulations
-
Education Provider Infosec Announces New Cybersecurity Scholarships
-
Defending Against Critical Threats: Analyzing Key Trends, Part 1
-
Faxes and snail mail: Will pandemic-era flaws unleash improved health technology?
-
#Enigma2022: Contextual Security Should Supplement Machine Learning for Malware Detection
-
MacRumors Exclusive: Get 20% Off Brydge’s Popular iPad Keyboards and MacBook Vertical Dock
-
KP Snacks hit by ransomware: Crisps and nuts firm KO’d by modern scourge
-
Report: 79% of ML teams say they ‘lack access’ to data needed to identify bias and ethics issues
-
S3 Ep68: Bugs, scams, privacy …and fonts?! [Podcast + Transcript]
-
Businesses’ Top Concerns Operating Cloud-native Technologies
-
Top-Ranking Banking Trojan Ramnit Stealing Payment Card Data
-
Iranian Hackers Employs PowerShell Backdoor to Bypass Security Products
-
Wormhole hack – Hackers steal $320M in one of the largest crypto heists
-
Sale of ‘Silent AirTags’ on eBay and Etsy Raises Privacy Concerns
-
Bitcoin miners are helping the Texas grid brace for winter storm impact
-
Telco Penalized €9 Million for Obscuring Cyberattack Impact from Customers
-
More than 90% of Russians do not Finish Reading User Agreements on the Internet
-
Meta Stock Suffers, As Facebook Looses Daily Users For First Time
-
Black History Month: Diversity in Cybersecurity Is More Important than Technology
-
Oil terminals in Europe’s biggest ports hit by a cyberattack
-
Apple Launches New iPhone 13 Product Pages Highlighting Key Features
-
New Year, Same Risks? Six Cyber Resilience Resolutions for a Safer 2022
-
Hackers Went Wild in 2021 — Every Company Should Do These 5 Things in 2022
-
Critical Flaws Discovered in Cisco Small Business RV Series Routers
-
As major winter storm descends on Texas, bitcoin miners are helping the power grid brace for impact
-
Keeper Security acquires Glyptodon to enhance privileged access management platform
-
Cybersecurity: Many managers just don’t want to understand the risks
-
Apple Did Not Mislead Customers About iPhone Water Resistance, Federal Judge Rules
-
Cyber Signals: Defending against cyber threats with the latest research, insights, and trends
-
Microsoft: ‘Dangerous mismatch’ in security due to slow MFA adoption
-
10 Best Laptops Under $200 in 2022 – Review and Buying Guide
-
Microsoft: This Mac malware is getting smarter and more dangerous
-
CISA Adds Eight More Flaws To Its Exploited Vulnerabilities Catalogue
-
New SEO Poisoning Campaign Is Wreaking Havoc on the Cyberthreat Landscape
-
3D printed guns, underground markets, bomb manuals: police crackdown continues
-
More than $8 million made from NFT wash trading: Chainalysis
-
Critical Vulnerabilities Found in Sealevel Device Used in ICS Environments
-
Execs keep flinging money at us instead of understanding security, moan infosec pros
-
Shuckworm Group uses Weaponized Word Document to Infect Victims Computer
-
Cisco Patches Critical Vulnerabilities in Small Business RV Routers
-
FBI Admits Procurement Of NSO’s Pegasus For ‘Product Testing’
-
Ransomware Often Hits Industrial Systems, With Significant Impact: Survey
-
China condemns US ban on telco, urges need for fair treatment
-
New SEO Poisoning Campaign Distributing Trojanized Versions of Popular Software
-
CARROT Weather Gets Redesigned Maps With 3D Globe View, Forecast Layers, and More
-
Hackers steal $326 million from blockchain platform Wormhole
-
[updated]Cyberattack on fuel supplier causes supply chain disruption
-
Welsh home improvement biz fined £200,000 over campaign of 675,478 nuisance calls
-
Financially Motivated Hackers Use Leaked Conti Ransomware Techniques in Attacks
-
Obrela acquires Encode to become one of Europe’s largest MDR players
-
New Variant of UpdateAgent Malware Infects Mac Computers with Adware
-
Apple’s Privacy Measures to Cost Facebook $10 Billion in 2022
-
Over 100,000 Files with Student Records from the British Council were Discovered Online
-
Apple Awards Bounty of $100,500 for Finding Flaws in MacBook
-
New Wave of Cyber Attacks Target Palestine with Political Bait and Malware
-
Building confidence in your system’s security with chaos engineering
-
eSafety worried proposed anti-trolling laws may be used in vigilante-style justice
-
FBI says more cyber attacks come from China than everywhere else combined
-
Apple Inc pays $100,500 to hacker for hacking MacBook Webcam
-
DHS official to chair Biden-ordered cyber safety review board
-
How are collaboration apps fairing in remote work environments?
-
Supply chain situation: All the numbers are working in our favor, says Port of Los Angeles
-
Unsecure Amazon S3 bucket Exposes IDs of Airport Security Employees
-
Cybersecurity in Competitive Online Gaming (Cheating, Mitigation, and Vulnerabilities)
-
Appgate secures Kubernetes workloads with cloud-native zero trust functionality
-
Codenotary Cloud identifies vulnerabilities in software development lifecycle
-
Mandiant Advantage Attack Surface Management allows security teams to operationalize intelligence
-
Limelight Layer0 Security protects against malicious website attacks
-
Cynamics launches cloud NDR to strengthen network monitoring and detection capabilities
-
UEFI firmware vulnerabilities affecting Fujitsu, Intel and more discovered
-
Keepit for Azure AD offers protection against accidental deletions and ransomware
-
Qualys minimizes vulnerability risk for organizations with new remediation feature
-
Gretel’s privacy engineering toolkit guards synthetic data against adversarial attacks
-
PingOne DaVinci provides no-code identity orchestration capabilities for enterprises
-
Juniper Secure Edge empowers customers to protect remote workforces from anywhere
-
Linux Legend “maddog” Shares Exclusive Security Insights with LinuxSecurity>
-
More than $320 million stolen in latest apparent crypto hack
-
Worried about occasional npm malware scares? They’re more common than you may think
-
CoreStack collaborates with Maureen Data Systems to offer cloud governance for managed services
-
Contrast Security partners with GitHub to deliver pipeline-native security to developers
-
Cybellum integrates with Siemens Polarion to drive vulnerability management under one platform
-
Shoulder surfing: Watch out for eagle‑eyed snoopers peeking at your phone
-
Sideloading Bill Would Allow ‘Malware, Scams and Data-Exploitation to Proliferate,’ Says Apple
-
Arctic Wolf acquires Tetra Defense to expand incident readiness solutions
-
Vaultree joins Global Cyber Alliance to create a safer online community
-
Anjuna Security expands executive team with four industry executives
-
Water Wars: Japan Focused on Defense Expansion, while U.S. Makes a Soft-Power Push
-
White House cyber office ‘expects to lead’ on workforce strategy
-
If My Organization Is Mostly in the Cloud, Do I Need a Firewall?
-
Facebook Celebrates Data Privacy Day By Recapping Year Of Efforts
-
WhiteSource Threat Report Reveals Massive Uptick In Cyberattacks Related To JavaScript npm
-
INKY Completes Email Security Offering With Launch of Outbound Mail Protection
-
Cato Networks Delivers Instant Visibility and Control of Cloud Application Data Risk
-
Purple Teaming Security Management Firm PlexTrac Raises $70 Million
-
Top cybersecurity leadership challenges and how to solve them
-
NY spearheads regional, data-driven approach to tracing illegal guns
-
Thousands of Data Center Management Apps Exposed to Internet
-
Threating hunting: Your best defense against unknown threats
-
Market research & conferencing service Civicom exposed 8TB of Data
-
Researcher found an Information Disclosure in the Brave browser
-
Japan Focused on Defense Expansion, while U.S. Makes a Soft-Power Push
-
Cyber Defense Media Group – 10 Year Anniversary – Daily Celebration in 2022
-
Alphabet Posts Record Results, Announces 20 for 1 Stock Split
-
TrickBot Gang Uses Template-Based Metaprogramming in Bazar Malware
-
Report: 75% of security leaders seek to implement edge use cases
-
The Real-World Impact of the Global Cybersecurity Workforce Gap on Cyber Defenders
-
Remote code execution vulnerability in Samba due to macOS interop module
-
Elementor WordPress plugin has a gaping security hole – update now
-
Metaverse tech could exacerbate today’s privacy problems, says Superset’s Tom Chavez
-
Tribal broadband effort gets $1.5 million federal investment
-
AT&T completes first 5G demonstration for ‘smart warehouse’ effort
-
Meet CoinStomp: New cryptojacking malware targets Asian cloud service providers
-
Trend Micro Patches Vulnerabilities in Hybrid Cloud Security Products
-
Notorious Spyware Firm Reportedly Offered Bags Of Cash For Access To US Networks
-
Deals: Get Up to $50 Off Apple Watch Series 7 Models on Amazon
-
UK think tank proposes Online Safety Bill reviewer to keep tabs on Ofcom decisions
-
Insider Threat Alert as employees take data while leaving a Job
-
Security automation startup Cerby raises $12M to secure non-IT-managed apps
-
BlackCat ransomware implicated in attack on German oil companies
-
1,300 Malicious Packages Found in Popular npm JavaScript Package Manager
-
Expert Insights: SAP & Yale Team Up To Promote Diversity In Cybersecurity Hiring
-
2,77,000 Routers Vulnerable to ‘Eternal Silence’ Assaults via UPnP
-
Iranian APT MuddyWater Targets Turkish Public and Government Entities
-
Introduction to Overhide-Ledger and Ledger-Based Authentication
-
Olympic Athletes Advised by FBI to Bring ‘Burner’ Phones to Beijing
-
TikTok’s Roland Cloutier: How CISOs Can Foster a Culture of Security & Transparency
-
More Than Half Of Ransomware Attacks Target Three Industries
-
What You Need to Do Today to Protect Against Account Takeover Attacks
-
Meet CoinStomp: new cryptojacking malware targets Asian cloud service providers
-
Tens of Thousands of Websites Vulnerable to RCE Flaw in WordPress Plug-in
-
Telegram Gains Better Reactions, Video Stickers, Interactive Emoji, and More
-
REvil took a hit by Russia’s FSB but may not be shut down yet
-
Arid Viper hackers strike Palestine with political lures – and Trojans
-
Announcing the public preview of Microsoft Azure Payment HSM service
-
FTC To Review Microsoft Activision Buy, As Sony Acquires Bungie
-
Passage Emerges From Stealth With Biometric User Authentication Platform
-
#Enigma2022: Pandemic Misinformation Reveals Challenges for Online Health Information
-
ESET releases fixes for local privilege escalation bug in Windows Applications
-
Cato Networks delivers first CASB for instant visibility and control of cloud application data risk
-
PlexTrac lands $70M to automate mundane tasks for security teams
-
SureMDM Vulnerabilities Expose Organizations to Supply Chain Attacks
-
FBI warning: Scammers are posting fake job ads on networking sites to steal your money and identity
-
Microsoft Defender for Endpoint now spots unpatched bugs in iOS and Android devices
-
Third of Employees Admit to Exfiltrating Data When Leaving Their Job
-
New Malware Used by SolarWinds Attackers Went Undetected for Years
-
Samba Patches Critical Flaws That Earned Researchers Big Rewards
-
FBI Warns of Potential Cyberattacks Targeting 2022 Winter Olympics
-
Experts warn of a spike in APT35 activity and a possible link to Memento ransomware op
-
ESET Patches High-Severity Vulnerability in Windows Applications
-
Samba Vulnerability Can Trigger RCE and Complete Root User Access
-
Samba bug may allow code execution as root on Linux machines, NAS devices (CVE-2021-44142)
-
Scottish Agency Still Recovering from 2020 Ransomware Attack
-
DMCA-dot-com XSS vuln reported in 2020 still live today and firm has shrugged it off
-
Business leaders are confident in their defences, despite over half falling victim to ransomware
-
How Dangerous Is Log4Shell and How it Affects the Java Industry?
-
The Samba Vulnerability: What is CVE-2021-44142 and How to Fix It
-
Experts found 23 flaws in UEFI firmware potentially impact millions of devices
-
68K People Who Received Services from Advocates were Affected by Data Theft
-
How to measure security efforts and have your ideas approved
-
Dozens of Security Flaws Discovered in UEFI Firmware Used by Several Vendors
-
Two initiatives that can move the needle for cybersecurity in 2022
-
Hacker Group ‘Moses Staff’ Using New StrifeWater RAT in Ransomware Attacks
-
Product showcase: Cybellum’s Product Security Lifecycle Platform
-
NSO Group of Pegasus Spyware wanted to access global signaling network
-
Rush to remote work left sysadmins struggling to keep businesses safe
-
Critical Bug Found in WordPress Plugin for Elementor with Over a Million Installations
-
Persistent data breaches fueling developer interest in cybersecurity
-
Automotive cybersecurity market size to reach $5.3 billion by 2026
-
Cymulate Amplify helps companies eliminate critical security blind spots
-
DrawnApart – A New Fingerprinting Technique Used to Track Your Activities Online
-
Guardsquare extends protection offering for Flutter to prevent tampering and reverse engineering
-
Cato CASB protects enterprises against data breach and cloud-delivered threats
-
GuidePoint Security unveils Zero Trust Workshops to improve zero trust adoption for customers
-
Quantifind Graphyte platform now available on Microsoft Azure
-
Picus Security joins MISA to protect critical data and assets against cyber attacks
-
Eseye and Armis launch a solution to secure connected devices on cellular networks
-
Accenture names Manish Sharma as COO and Yusuf Tayob as Group Chief Executive of Operations
-
Talon Cyber Security raises $43 million to support the high demand for secure hybrid work
-
Pixm raises $4.3 million to protect enterprises from phishing attacks
-
Cengage Group acquires Infosec to expand into the cybersecurity professional training market
-
Update now: Samba prior to 4.13.17 hit with remote root code execution bug
-
Secure Web Browsers Tackle Ransomware, Insider Threat in Enterprises
-
Noname Security appoints Filip Verloy as Technical Evangelist for EMEA
-
Former Facebook Executive Warns The Company Isn’t Ready For Election Hate Speech And Misinformation
-
OpenSSF announces Alpha-Omega Project to improve global OSS supply chain security
-
Hunting pwnkit Local Privilege Escalation in Linux (CVE-2021-4034)
-
Massive social engineering waves have impacted banks in several countries
-
GAO audit again shines light on problems in VA’s health records rollout
-
Army Materiel Command looks to advanced manufacturing to improve readiness
-
ShiftLeft CORE ‘Velocity Update’ Streamlines Triage, Automates Build Security Controls
-
Digital Shadows Launches New Vulnerability Intelligence Module
-
Forescout Acquires CyberMDX to Expand Healthcare Cybersecurity Focus
-
Unpatched Security Bugs in Medical Wearables Allow Patient Tracking, Data Theft
-
Apple Releases watchOS 8.4.1 With Bug Fixes for Apple Watch Series 4 and Later
-
NAPA report backs shift in leadership for cyber workforce development
-
Next-gen contact centers demand upgraded infrastructure, automation, human-centered design
-
DOD opens two fresh facilities to field next-gen supercomputers
-
YouTube Still Testing Picture-in-Picture on iOS With Premium Subscribers
-
Researchers Devise “DrawnApart” – A GPU Fingerprinting Technique
-
Governments turning to data to find solutions to equity issues
-
Think Big, Start Small, Move Fast: Applying Lessons From The Mayo Clinic to Cybersecurity
-
7 Red Flags That Can Stop Your Company From Becoming a Unicorn
-
British Council exposed 144,000 files containing student details
-
The power of chaos: A robust and low-cost cryptosystem for the post-quantum era
-
Civil rights groups launch effort to stop IRS use of ‘flawed’ ID.me facial recognition
-
How to Protect All Five Stages of the IoT Security Lifecycle
-
DeepDotWeb Operator Sentenced to Eight Years for Role in $8.4 million Kickback Scheme
-
BRATA Android malware factory resets phones after stealing funds
-
Two Dozen UEFI Vulnerabilities Impact Millions of Devices From Major Vendors
-
Linux kernel patches “performance can be harmful” bug in video driver
-
Apple TV+ Shares First Look at ‘Foundation’ Season 2 With New Cast Member Reveal
-
iOS 15.4 Beta Adds Option to Hide iCloud Keychain Security Recommendations
-
Improve your security defenses for ransomware attacks with Azure Firewall
-
Congratulations to the Top MSRC 2021 Q4 Security Researchers!
-
Ransomware means your database IS the front line. How are you defending it?
-
Complexity vs. Capability: How to Bridge the Security Effectiveness Gap
-
SolarMarker Malware Uses Novel Techniques to Persist on Hacked Systems
-
Firewalla launches Purple: Its must-have network security device
-
Shell forced to reroute supplies after cyberattack on two German oil companies
-
FBI Releases PIN on Potential Cyber Activities During the 2022 Beijing Winter Olympics and Paralympics
-
Unreleased iPhone, Entry-Level iPad, and iPad Air Imported Into India Ahead of Rumored Spring Launch
-
Hackers are now using ransomware in attempt to remain undetected
-
FBI Releases PIN on Potential Cyber Activities During the 2022 Beijing Winter Olympics and Paralympics
-
U.S. State Department Picks Apart PRC’s South China Sea Customary Law Claim
-
600K WordPress Sites Impacted By Critical Plugin RCE Vulnerability
-
Why is cybersecurity one of the best fields for young people to enter?
-
Quantum computing brings new security risks: How to protect yourself
-
FBI says no smart phones, computers and tablets at Beijing Winter Olympics
-
Report: Enterprises expect remote work to take permanent hold
-
Check Point acquires ‘developer-first’ security startup to boost CloudGuard platform
-
Delinea Emerges as a Leading PAM (Privileged Access Mgmt) Provider
-
Iranian Hackers Using New PowerShell Backdoor Linked to Memento Ransomware
-
Qualys Adds Advanced Remediation Capabilities to Minimize Vulnerability Risk
-
Armis and Eseye joint solution reliably secures connected devices on cellular networks
-
Andreas Deliandreadis announced as Kiteworks VP of Sales, EMEA
-
Comment From Cybersecurity Expert: The Dangers Of Dating Apps As Valentine’s Day Approaches
-
Samba patches critical vulnerability that allows remote code execution as root
-
Cyberattacker hits German service station petrol terminal provider
-
ESET: Criminals will be Able to Steal Personal Data Using Smartwatches
-
CRTC Inquiry Targets Dark Web Marketplace Sellers and Administrator
-
Mastercard Launches Global Cybersecurity Alliance Program to Further Secure The Digital Ecosystem
-
A cyber attack severely impacted the operations of German petrol distributor Oiltanking GmbH
-
Deals: AirPods Max on Sale for $449.99 in Every Color ($99 Off)
-
Critical Log4j Vulnerabilities Are the Ultimate Gift for Cybercriminals
-
One in seven ransom extortion attempts leak key operational data
-
THE STAKES HAVE NEVER BEEN HIGHER: HOW TO EXPAND THE CYBER WORKFORCE
-
These hackers are hitting victims with ransomware in an attempt to cover their tracks
-
Forescout acquires healthcare cybersecurity provider CyberMDX
-
Living Off the Land: How to Defend Against Malicious Use of Legitimate Utilities
-
Critical Flaw Impacts WordPress Plugin With 1 Million Installations
-
Duo of Android dropper and payload target certain countries and app users
-
Cymulate Launches Service to Augment In-House Security Teams
-
Coalition Launches Executive Risks Products With Personalized Risk Assessment
-
Solarmarker Malware Uses Novel Techniques to Persist on Hacked Systems
-
Black Unity Braided Solo Loop Available at Select Apple Stores Starting Today
-
OneDrive Mac Users Unhappy With Buggy and Enforced New ‘Files On-Demand Experience’
-
Google and Microsoft back the Alpha-Omega Project to bolster software supply chain
-
Cybersecurity M&A Roundup: 31 Deals Announced in January 2022
-
Virgin Media O2 Mulls Fibre Network Expansion With New Venture – Report
-
One in seven ransomware extortion attempts leak key operational tech records
-
Island unveils secure browser to give enterprises ‘full control’ over data
-
Apply those updates now: CVE bypass offers up admin privileges for Windows 10
-
CISA Adds Recent iOS, SonicWall Vulnerabilities to ‘Must Patch’ List
-
Iran-linked MuddyWater APT group campaign targets Turkish entities
-
iOS 15.4 Beta Suggests Apple to Support Push Notifications From Web-Based Apps
-
AI-powered anti-phishing solution provider Pixm offers last line of defense
-
State-sponsored Iranian hackers attack Turkish government, private organizations
-
Iranian Hackers Using New PowerShell Backdoor in Cyber Espionage Attacks
-
‘White Tur’ Hacking Group Borrows Techniques From Multiple APTs
-
14 Best Gaming Laptops Under $1000 2022 – Reviews & Buying Guide
-
During a Live Stream Ceremony, the Nobel Foundation Disclosed a DDoS attack
-
Russia’s naval exercise near Ireland unlikely to involve cable-tapping shenanigans
-
Ukraine Continues to Face Cyber Espionage Attacks from Russian Hackers
-
Apple Offering $25 Extra Credit During Apple Watch Trade-In in Celebration of Heart Month
-
Looking for adding new detection technologies in your security products?
-
7 Best Gaming PC under $500 That Can Run Any Game 2022 – Prebuild
-
Ransomware Groups are Enlisting Breached Individuals to Persuade Firms to Pay Up
-
Researchers Uncover New Iranian Hacking Campaign Targeting Turkish Users
-
Home Affairs singles out Meta as most reluctant to stop online abuse
-
How ready are federal agencies for zero trust implementation?
-
New SureMDM Vulnerabilities Could Expose Companies to Supply Chain Attacks
-
RCE in WordPress plugin Essential Addons for Elementor impacts hundreds of thousands of websites
-
Top attack trends every organization should build resilience against
-
North Korean Hacker Group Deliver KONNI Rat Malware Using Weaponized Office Document
-
Understaffing persistently impacting enterprise privacy teams
-
Organizations neglecting Microsoft 365 cybersecurity features
-
Armor Unlocks the Constraints Companies Face with Traditional Cybersecurity Providers
-
REGISTER TODAY FOR THE (ISC)² ENTRY-LEVEL CYBERSECURITY CERTIFICATION PILOT EXAM
-
New Samba Bug Allows Remote Attackers to Execute Arbitrary Code as Root
-
Imperva is on Top of the World as it Announces New PoP in Bogotá
-
Quantum Star Technologies Starpoint detects zero-day threats at the binary level
-
Magnet AUTOMATE Enterprise provides parallel processing of multiple target endpoints
-
Google Removed Fake Authenticator App From Play Store That Dropped Vultur Malware
-
Google Launched Differential Privacy Tool for Python Developers
-
UK NCSC Rolls Out SME NMAP Scripts To Detect Vulnerabilities
-
FBI urges athletes to keep personal devices at home, use burners during Beijing Winter Olympics
-
Apple Targeting Indie Director Over ‘Apple-Man’ Film Title Trademark
-
Researchers develop automated approach to extract security policies from software
-
SoftBank-backed Cybereason reportedly files confidential paperwork to go public
-
Apple, SonicWall, Internet Explorer vulnerabilities added to CISA list
-
Updates released for multiple vulnerabilities found in 42 Gears’ SureMDM products
-
What Hackers Know About Your Software Supply Chain (That You Don’t)
-
CVE-2022-0185: Kubernetes Container Escape Using Linux Kernel Exploit
-
Mandiant: One in 7 Ransomware Extortion Attacks Expose OT Data
-
Security Service Edge Boosters Form New Forum to Encourage Adoption
-
Wasabi opens Paris storage region to enhance the availability of its services
-
State Department confirms ‘defect’ led to resolved global IT outage
-
2022-01-27 – Contact Forms Campaign IcedID (Bokbot) with Cobalt Strike
-
Labor Department announces grants for states to expand UI access
-
Popular Browser Game ‘Wordle’ Sold to The New York Times, Will Remain Free ‘Initially’
-
DIU boasts more rapid acquisition agreements, fewer transitioned tech in 2021
-
2022-01-27 – Contact Forms Campaign IcedID (Bokbot) with Cobalt Strike
-
Facebook Messenger Will Now Notify You If Someone Screenshots Your Disappearing Message
-
CISA adds 8 new vulnerabilities to its Known Exploited Vulnerabilities Catalog
-
Sports Scores and Favorite Team Selection Likely Coming to Apple News App
-
Apple TV+ Subscribers Who Join for Major Releases Like ‘Greyhound’ Don’t Stick Around
-
Phishing Campaign Registers Attacker’s Device With Victim Network
-
IG report points to weaknesses in the Commerce Department’s infosec program
-
Hundreds of thousands of routers exposed to Eternal Silence campaign via UPnP
-
Mini-LED iMac Pro to Launch in Mid-2022, Not Expected at Spring Event
-
Deals: Apple’s M1 iMac (8-Core GPU, 256GB) Drops to New Low of $1,349.99 in Several Colors
-
Top 9 Best Laptop for Adobe Creative Cloud 2022 – Photoshop, Illustrator
-
Security giant exposed 3TB of sensitive airport & employees data
-
Conti Ransomware Targets Taiwanese Apple and Tesla Supplier Delta Electronics
-
Zscaler CEO: Network security firms have ‘hijacked’ zero trust
-
The deadline is here for federal contractors to start paying at least $15 an hour
-
OT Data Stolen by Ransomware Gangs Can Facilitate Cyber-Physical Attacks
-
Website operator fined for using Google Fonts “the cloudy way”
-
iMac Pro to Launch in Mid-2022, Not Expected at Spring Event
-
An Important Development in the Law of Diplomatic Appointments
-
Apple Patched Two Zero-Day Bugs And Other Flaws With iOS 15.3, Safari 15.3
-
This Phishing Attack Meddles With Your Emails – Alerts Microsoft
-
Some iPhone Users Experiencing Issues With Apple Card Payments
-
How a few PhD students revealed that phishing trainings might just not work: Lock and Code S03E03
-
Top-Ranking Banking Trojan Ramnit Out to Steal Payment Card Data
-
Multilingual Cybersecurity Awareness Training adapted for your needs
-
Looking Back at Rumors of iPhone X Design With Rear Touch ID That Never Emerged
-
North Korean Hackers Abuse Windows Update Client in Attacks on Defense Industry
-
Your Graphics Card Fingerprint Can Be Used to Track Your Activities Across the Web
-
Curated, tested and supported: How enterprise vendors mitigate open source supply chain risk
-
Unsecured AWS Server Exposed 3TB In Airport Employee Records
-
What To Do To Delete The Scary Amount Of Data Google Has On You
-
Top US Spy Warns Too Many Government Secrets Harms National Security
-
PwnKit Linux Vulnerability Discovered And Fixed After 12 Years
-
New LockBit Ransomware Variant Evolves To Target Linux Systems
-
Unsecured AWS server exposed 3TB in airport employee records
-
Ransomware: Over half of attacks are targeting these three industries
-
The Looming CISO Mental Health Crisis — and What to Do About It, Part 2
-
Ransomware: Over half of attacks are targeting these three industries
-
The Zero Trust Timer Is on for Federal Agencies — How Ready Are They?
-
Hackers stole $80M worth of cryptocurrency from the Qubit DeFi platform
-
Natural Silk Fibers Used by Researchers to Generate Secure Keys
-
DeepDotWeb admin sentenced to 97 months in prison for money laundering scheme
-
PwnKit Linux Vulnerability Discovered And Fixed After 12 Years
-
New LockBit Ransomware Variant Evolves To Target Linux Systems
-
Unsecured AWS server exposed 3TB in airport employee records
-
The Looming CISO Mental Health Crisis — and What to Do About It, Part 2
-
Deals: iPad Air Drops to All-Time Low Price of $499.99 ($99 Off)
-
SureMDM Vulnerabilities Exposed Companies to Supply Chain Attacks
-
The Third Building Block for the SOC of the Future: Balanced Automation
-
HOW TO BECOME AN (ISC)² VOLUNTEER AND MAKE A DIFFERENCE IN THE CYBERSECURITY COMMUNITY
-
Microsoft: Here’s how we stopped the biggest ever DDoS attack
-
Expert earned $100,500 bounty to hack Apple MacBook webcam and microphone
-
CISA’s ‘Must Patch’ List Puts Spotlight on Vulnerability Management Processes
-
Actor’s verified Twitter profile hijacked to spam NFT giveaways
-
North Korean Hackers Leverages Windows Update Client to Execute Malicious Payload
-
Attackers are Using Shipment-Delivery Scams to Lure Victims to Install Trickbot
-
10K Victims Infested via Google Play 2FA App Loaded with Banking Trojan
-
Priti Patel Approves Extradition Of Autonomy Founder Mike Lynch
-
Extra, Extra, VERT Reads All About It: Cybersecurity News for the Week of January 24, 2022
-
Why Do Many CISOs Prefer Incident Response over Threat Prevention?
-
German Court Rules Websites Embedding Google Fonts Violates GDPR
-
Trying to register your antivirus in Windows Security Center?
-
Americans lost $770 million from social media fraud in 2021, FTC reports
Generated on 2022-02-06 23:59:24.109547