Horizon3.ai Unveils: ‘Year in Review: Thru the Eyes of the Attacker 2022’
Addressing the Effects of Civilian Targeting: Lessons from Syria for Ukraine
Energy and Healthcare Firms Are The Focus of The Lazarus Group Once Again
LexisNexis’ Virtual Crime Center: Making Millions from Sales to the U.S. Government
The biggest risks in procrastinating on iPhone, Android software updates
The biggest risks in putting off iPhone and Android software updates
Apple and Google are Under Rising Pressure to Remove TikTok From App Stores
Fraudulent “CryptoRom” Apps Slip Through Apple and Google App Store Review Process
Microsoft attributes Charlie Hebdo data leak to Iran-linked NEPTUNIUM APT
Have we learnt nothing from SolarWinds supply chain attacks? Not yet it appears
Week in review: Rail transport cybersecurity, “verified” OAuth apps used to infiltrate organizations
Cyber Security Management System (CSMS) for the Automotive Industry
Cybersecurity Leaders Launch OSC&R, An Open Framework for Analyzing Threats
Improve KeePass security with this simple configuration change
ExtraHop and Binary Defense join forces to protect customers against advanced threats
Instant Checkmate, TruthFinder Data Breach: 20M Accounts Leaked
CISA adds Oracle, SugarCRM bugs to its Known Exploited Vulnerabilities Catalog
Dingo Token ranking is #774, with a live market cap of $10,941,525 USD is a SCAM!
Edgio Sponsors OWASP ModSecurity CRS to Further Advance Application Security Development
Royal Mail “cyber incident” is an ongoing cyberattack CEO admits to MPs
To protect satellites, secure your networks, chief of space ops says
S3 Ep120: When dud crypto simply won’t let go [Audio + Text]
How the end of Netflix password sharing will change the way families watch
PixPirate: New Android Banking Trojan Targeting Brazilian Financial Institutions
Beware: Malicious Apps On Apple & Google Play Push Users into Fake Investments
CERT-FR warns of a new wave of ransomware attacks targeting VMware ESXi servers
Google Shells Out $600,000 for OSS-Fuzz Project Integrations
Drupal Releases Security Update to Address a Vulnerability in Apigee Edge
A High-severity bug in F5 BIG-IP can lead to code execution and DoS
Tallahassee Memorial HealthCare, Florida, has taken IT systems offline after cyberattack
Scale Azure Firewall SNAT ports with NAT Gateway for large workloads
Industry voices complaints over short response window for $60B VA recompete
Lack of emerging tech framework is ‘weakening’ US stance against China, lawmakers warn
Malware Attacks can be Thwarted by Tampering with DNS Communications
Mitigate risk by integrating threat modeling and DevOps processes
Study: Companies have upwards of 1,000 apps but only a third are integrated
AppSec Playbook 2023: Study of 829M Attacks on 1,400 Websites
Patch Critical Bug Now: QNAP NAS Devices Ripe for the Slaughter
Google Boosts Bounties For Open Source Flaws Found Via Fuzzing
Up To 29,000 Unpatched QNAP Storage Devices Are Sitting Ducks To Ransomware
New Wave of Ransomware Attacks Exploiting VMware Bug to Target ESXi Servers
CyberSaint STRONGER 2023 Conference Call for Speakers is Open!
IRONSCALES Enters 2023 Riding Significant Wave of Positive Momentum
Lazarus Group Attack Identified After Operational Security Fail
Women in CyberSecurity Calls for Participants for New Measuring Inclusion Workshops
Warning: Hackers Actively Exploiting Zero-Day in Fortra’s GoAnywhere MFT
The Cybercrime Ecosystem Knits a Profitable Underground Gig Economy
TrickGate: Malicious Software Outwitting Antivirus for 6 Years
Prilex POS malware evolves to block contactless transactions
Cybersecurity Leaders Launch First Attack Matrix for Software Supply Chain Security
Managing the Governance Model for Software Development in a No-Code Ecosystem
A Nunavut Ransomware Incident Was Not Reported by Qulliq Energy
Is malware abusing your infrastructure? Find out with VirusTotal!
2023-02-03 – DEV-0569: Google ad –> FakeBat Loader –> Redline Stealer and Gozi/ISFB
MITRE CREF Navigator empowers enterprises to improve cyber resiliency strategies
India’s Largest Truck Brokerage Company Leaking 140GB of Data
Key takeaways from ESET’s new APT Activity Report – Week in security with Tony Anscombe
Romance fraud losses rose 91% during the pandemic, claims UK’s TSB bank
Drupal Releases Security Update to Address a Vulnerability in Apigee Edge
Atlassian’s Jira Service Management Found Vulnerable to Critical Vulnerability
NTT Partners with Palo Alto Networks to Deliver Managed Prisma SASE
Cybersecurity Budgets Are Going Up. So Why Aren’t Breaches Going Down?
New Russian-Backed Gamaredon’s Spyware Variants Targeting Ukrainian Authorities
Experts warn of two flaws in popular open-source software ImageMagick
Civilian Harm Mitigation: An Opportunity for Values-Based U.S. Leadership at NATO
AI Transcription Service vs. Human Transcription: How to Decide?
Over 1800 Android Mobile App Web Injects for Sale on Hacking Forums
North Korean Hackers Exploit Unpatched Zimbra Devices in ‘No Pineapple’ Campaign
OAuth Explained: A Guide to Understanding What It Is and How It Works
Super Bock says ‘cyber’ nasty ‘disrupting computer services’
Cyberthreats facing UK finance sector “a national security threat”
How the CISA catalog of vulnerabilities can help your organization
Business Email Compromise attack imitates vendors, targets supply chains
LockBit Ransomware Attack on ION and Expeditors faces $2m lawsuit from customer
New Prilex Malware Blocks Contactless Payments to Steal Credit Card Data
Lazarus Group Rises Again, to Gather Intelligence on Energy, Healthcare Firms
New Threat: Stealthy HeadCrab Malware Compromised Over 1,200 Redis Servers
Over 30k Internet-Exposed QNAP NAS hosts impacted by CVE-2022-27596 flaw
Ransomware conversations: Why the CFO is pivotal to discussing and preparing for risk
InTheBox Threat Actor Sells Over 1,800 Web Injects on Cybercrime Forums
Courts Must Not Allow Litigants to Plead Around The First Amendment’s Speech Protections
Army wants ideas from industry on autonomous, anti-drone capabilities
How to Address the Requirements of Personal Data Protection (PDP) Law of Indonesia
Cybersecurity organizations fight back against rise of emotet and omnatuor malvertising
The black hat hacker trap: Why unethical hacking lures young people
Iran-Backed Actor Behind ‘Holy Souls’ Cyberattack on Charlie Hebdo, Microsoft Says
Watchdog Group Issues Warning About Scam Financial Influencers On Facebook
NIST researcher calls for further evaluation of the AI impact on humans
How to solve customer-service language barriers with virtual queuing
Check Point Software Join Forces with Samsung to Elevate Mobile Security
TechRepublic Premium editorial calendar: IT policies, checklists, toolkits and research for download
Up to 10 million people potentially impacted by JD Sports breach
GitHub revokes several certificates after unauthorized access
Malwarebytes earns AV-TEST Top Product awards for fifth consecutive quarter
Fast-evolving Prilex POS malware can block contactless payments
Guy accused of wrecking crypto exchange now hauled into court
OpenSSH fixes double-free memory bug that’s pokable over the network
Exploitation attempts for Oracle E-Business Suite flaw observed after PoC release
Another RAC staffer nabbed for storing, sharing car crash data
Guy accused of crashing crypto exchange now hauled into court
Check Point Software takes 1st Place in Independent Test of Top Network Firewalls
Dashboard helps city track diversity, equity, inclusion progress
How to build an incident response plan, with examples, template
Inside Killnet: Pro-Russia Hacktivist Group’s Support and Influence Grows
Google boosts bounties for open source flaws found via fuzzing
Digital Health Company Allegedly Sold Sensitive Health Information To Facebook
Reduce Data Breaches by Adding a Data Privacy Vault to Your HealthTech App Architecture
R&D funding vehicle could supercharge small biz innovation programs
Singapore, EU digital pact to cover ‘all areas’ of bilateral cooperation
Flipper Zero: How to install third-party firmware (and why you should)
Password-stealing “vulnerability” reported in KeePass – bug or feature?
Radiant Logic Signs Definitive Agreement to Acquire Brainwave GRC
Researchers Uncover New Bugs in Popular ImageMagick Image Processing Utility
Microsoft sweeps up after breaking .NET with December security updates
Chinese ‘surveillance balloon’ over US causes fearful gasbagging
Protect Your Online Data Now, Rather than Waiting for the Government
Bitwarden Password Manager will add support for Argon2 KDF soon
MalVirt Loaders Exploit .NET Virtualization to Deliver Malvertising Attacks
Va. regulators propose easing emission limits for data centers over power transmission concerns
Microsoft: We are tracking these 100 active ransomware gangs using 50 types of malware
Beating the Odds: 3 Challenges Women Face in the Cybersecurity Industry
VMware Releases Security Update for VMware vRealize Operations
Attackers Abuse Microsoft’s Verified Publisher Status To Steal Data
Chinese surveillance balloon over US causes fearful gasbagging
High-Severity Privilege Escalation Vulnerability Patched in VMware Workstation
Atlassian Warns of Critical Jira Service Management Vulnerability
Atlassian Patches Critical Authentication Flaw in Jira Software
Anker Confirms Eufy Cameras Not Fully Encrypted, Raising Concerns
Hackers Abuse Microsoft’s ‘Verified Publisher’ OAuth Apps to Hack Organizations Cloud
Report: 6 keys for successful government crisis contact centers
Command-Injection Bug in Cisco Industrial Gear Opens Devices to Complete Takeover
Scores of Redis Servers Infested by Sophisticated Custom-Built Malware
The Pivot: How MSPs Can Turn a Challenge Into a Once-in-a-Decade Opportunity
New Prilex PoS Malware evolves to target NFC-enabled credit cards
Server-Side Request Forgery Attack Explained: Definition, Types, Protection
Insider Attacks Becoming More Frequent, And Difficult Gurucul Report
Where Do the Most Ransomware Attacks Take Place in the United States?
New Credential-Stealing Campaign By APT34 Targets Middle East Firms
Post-Macro World Sees Rise in Microsoft OneNote Documents Delivering Malware
Is Your EV Charging Station Safe? New Security Vulnerabilities Uncovered
Airbnb is making a simple, but big booking change bringing it closer to hotel check-in
Corvus Supercharges Cyber Underwriters with Corvus Risk Navigator™
Gem Security shows detection and response key to cloud security, raises $11M
Microsoft warning: These phishing attackers used fake OAuth apps to steal email
The dark side of Optimize Mac Storage: What you need to know if you rely on it
ManageEngine Study Finds United States Enterprises Hit by Short-Staffed Security Operations Centers
KnowBe4 to Offer $10,000 to Black Americans in Cybersecurity Scholarship
Experts Warn of ‘Ice Breaker’ Cyberattacks Targeting Gaming and Gambling Industry
Central Bank Immunity, Afghanistan, and Judgments Against the Taliban
Safer Internet Day: Experts Reveal 7 Tips To Avoid DeepFake Scams
OilRig Hackers Exfiltrate Data From Govt. Agencies Using New Backdoors
New Versions of Prilex POS Malware Can Block Contactless Transactions
How Crypto & Blockchain Technology Changed the Way Casinos Do Business
VMware Workstation update fixes an arbitrary file deletion bug
Hate It When That Happens: China Says It’s Checking If It Accidentally Sent A Spy Balloon To Montana
Former Ubiquiti Dev Pleads Guilty In Data Theft And Extortion Case
Corvus Supercharges Cyber Underwriters with Corvus Risk Navigator™
KeePass Password Manager Vulnerability: Is Your Data at Risk?
China “Deeply Concerned” At US Halt Of Export Licences For Huawei
Why confidential computing will be critical to (not so distant) future data security efforts
Rising ‘Firebrick Ostrich’ BEC Group Launches Industrial-Scale Cyberattacks
New SH1MMER Exploit for Chromebook Unenrolls Managed ChromeOS Devices
Global Technology Products, U.S. Security Policy, and Spectrums of Risk
Digital Project Design Brief: A Key to Effective Partnership
Tougher cybersecurity rules may be more than a year away—but don’t wait to get ready
Atlassian fixed critical authentication vulnerability in Jira Software
Electric Vehicle Vulnerabilities Can Allow Hackers To Disrupt System, Cause Energy Theft
Corvus Supercharges Cyber Underwriters with Corvus Risk Navigator™
GitHub Breach – Hackers Stole Code Signing Certificates From Repositories
Nvidia CSO: Generative AI, ChatGPT has made security a ‘cat and mouse’ game
Key Insights From the Guide to Cybersecurity Trends and Predictions for 2022-23
The State of the US National Cybersecurity Strategy for the Electric Grid
Prilex PoS Malware Evolves to Block Contactless Payments to Steal from NFC Cards
New LockBit Green ransomware variant borrows code from Conti ransomware
Threat Actors Gained Access to Google Fi Customers’ Information
Congress Has a Lo-Fi Plan to Fix the Classified Documents Mess
The Pivot: How MSPs can Turn a Challenge Into a Once-in-a-Decade Opportunity
Iranian OilRig Hackers Using New Backdoor to Exfiltrate Data from Govt. Organizations
LockBit Goes ‘Green’: How the New Conti-Based Encryptor Is Changing the Ransomware Game
Corvus Supercharges Cyber Underwriters with Corvus Risk Navigator™
US Official Confirms Japan, Netherlands Joined US China Chip Sanctions
Exploitation of Oracle E-Business Suite Vulnerability Starts After PoC Publication
Hackers Abused Microsoft’s “Verified Publisher” OAuth Apps to Breach Corporate Email Accounts
The ‘New Cold War’ Continues To Mark Urgency For Organisations To Bolster Cyber-Resilience
Corvus Supercharges Cyber Underwriters with Corvus Risk Navigator™
TgToxic Malware’s Automated Framework Targets Southeast Asia Android Users
Cyberattacks on Energy’s National Labs draw lawmaker scrutiny
Hackers are using this new trick to deliver their phishing attacks
Another RAC staffer nabbed for storing and sharing road accident data
Attackers abuse Microsoft’s ‘verified publisher’ status to steal data
Ransomware Attacks on the Small and Medium Businesses are on the Rise
2022 in Review: Privacy gains footholds in the US; EU continues to lead
Patch your Jira Service Management Server and Data Center and check for compromise! (CVE-2023-22501)
Corvus Supercharges Cyber Underwriters with Corvus Risk Navigator™
Additional Supply Chain Vulnerabilities Uncovered in AMI MegaRAC BMC Software
Russia-linked Gamaredon APT targets Ukrainian authorities with new malware
Corvus Supercharges Cyber Underwriters with Corvus Risk Navigator™
GitHub Reports Code-Signing Certificate Theft in Security Breach
New DDoS-as-a-Service Platform Attacking Medical Institutions
2023-01-31 – BB12 Qakbot (Qbot) with Cobalt Strike and VNC traffi
How Can Disrupting DNS Communications Thwart a Malware Attack?
Cisco fixed command injection bug in IOx Application Hosting Environment
Want your endpoint security product in the Microsoft Consumer Antivirus Providers for Windows?
Corvus Supercharges Cyber Underwriters with Corvus Risk Navigator™
Atlassian’s Jira Software Found Vulnerable to Critical Authentication Vulnerability
New High-Severity Vulnerabilities Discovered in Cisco IOx and F5 BIG-IP Products
Corvus Supercharges Cyber Underwriters with Corvus Risk Navigator™
LockBit claims responsibility for ION ransomware attack but US/UK hounds are sniffing
Corvus Supercharges Cyber Underwriters with Corvus Risk Navigator™
CISOs laxity towards cybersecurity is leading to more Cyber Attacks
Hackers Use TrickGate Packer to Deploy Emotet, Cobalt Strike & Other Malware
We can’t rely on goodwill to protect our critical infrastructure
Corvus Supercharges Cyber Underwriters with Corvus Risk Navigator™
CISA Alert: Oracle E-Business Suite and SugarCRM Vulnerabilities Under Attack
Inability to prevent bad things from happening seen as the worst part of a security job
Short-staffed SOCs struggle to gain visibility into cloud activities
Corvus Supercharges Cyber Underwriters with Corvus Risk Navigator™
MITRE Launches Cyber Resiliency Engineering Framework Navigator
Uprite Services Achieves HIPAA Compliance With Compliancy Group
Pixalate iCloud Private Relay helps users measure their exposure to iCPR traffic
Keepit introduces backup and recovery solution for Power BI users
HYCU R-Cloud protects all business-critical apps from on-premises to SaaS
Netwrix 1Secure empowers MSPs to secure clients from a single console
NordVPN Identifies the Most Risky Websites for Users’ Privacy and Security
Corvus Supercharges Cyber Underwriters with Corvus Risk Navigator™
Wasabi Surveillance Cloud offloads surveillance footage from local storage directly to the cloud
Corvus Supercharges Cyber Underwriters with Corvus Risk Navigator™
Corvus Supercharges Cyber Underwriters with Corvus Risk Navigator™
Former Ubiquiti dev pleads guilty in data theft and extortion case
Radiant Logic acquires Brainwave GRC to strengthen security posture for customers
NTT and Palo Alto Networks join forces to improve security management for enterprises
Corvus Supercharges Cyber Underwriters with Corvus Risk Navigator™
Everything You Need To Know About The Latest Imperva Online Fraud Prevention Feature Release
EFF, ACLU Seek to Protect the Public’s Right to Access Judicial Records
Cybersecurity and privacy tips you can teach your 5+-year-old
ACLU, EFF Seek to Protect the Public’s Right to Access Judicial Records
Corvus Supercharges Cyber Underwriters with Corvus Risk Navigator™
U.S. cyberspace ambassador lays out technology’s role in geopolitical contests
Corvus Supercharges Cyber Underwriters with Corvus Risk Navigator™
Sentra Raises $30 Million Series A Financing to Meet Growing Demand for Data Security in the Cloud
Aura and Nonprofit Cyversity Partner to Support a More Inclusive Cyber Workforce
New Survey Reveals 40% of Companies Experienced a Data Leak in the Past Year
NanoLock Addresses Global Industrial & OT Cyber Demand with Expansions into Europe and North America
Hackers Stole GitHub Desktop and Atom Code-Signing Certificates
Amid FTX’s burning wreckage, Japan outpost promises asset withdrawals in February
Conti Source Code & Everything API Employed by Mimic Ransomware
Threat activity increasing around Fortinet VPN vulnerability
Corvus Supercharges Cyber Underwriters with Corvus Risk Navigator™
Are Your Employees Thinking Critically About Their Online Behaviors?
Cyberattack on Fintech Firm Disrupts Derivatives Trading Globally
Hornetsecurity Combats QR Code Phishing With Launch of New Technology
Understanding Business Email Compromise to better protect against it
US Hospitals DDoS Attack, Websites Taken Down By Russian Hackers
10 Ways Digitalisation is Improving the UK Immigration Process
As pandemic-era Medicaid provisions lapse, millions approach a coverage cliff
Corvus Supercharges Cyber Underwriters with Corvus Risk Navigator™
Facebook & Instagram Flaw Let Anyone Bypass Two-factor Authentication
Phishing attacks are getting scarily sophisticated. Here’s what to watch out for
GitHub code-signing certificates stolen (but will be revoked this week)
The Lessons of the Electoral Count Reform Act: Next Steps in Reform
Porsche Stops NFT Launch While Phishing Sites Fills The Space
10 Million JD Sports Customers Had Their Data Exposed in a Data Breach
Corvus Supercharges Cyber Underwriters with Corvus Risk Navigator™
11 Questions to Ask When Choosing an Application Security Vendor
Saviynt raises $205M and affirms that IAM must be cloud-friendly
Oversight Chairman Comer: ‘We’re two years behind in oversight’
Cyber Insurance Companies Require Enhanced Security from Clients
Rising ‘Firebrick Ostrich’ BEC Group Launches Industrial-Scale Cyberattacks
Researchers Uncover Packer Used by Several Malware to Evade Detection for 6 Years
New Report Reveals NikoWiper Malware That Targeted Ukraine Energy Sector
4 Ways Artificial Intelligence Is Making Virtual Casinos Safer for Users
Dingo Token ranking is #774, with a live market cap of $10,941,525 USD is a SCAM!
To protect satellites, secure your networks, chief of space ops says
S3 Ep120: When dud crypto simply won’t let go [Audio + Text]
Corvus Supercharges Cyber Underwriters with Corvus Risk Navigator™
APT groups use ransomware TTPs as cover for intelligence gathering and sabotage
Foreign states already using ChatGPT maliciously, UK IT leaders believe
The Hidden Threat: 1Password Password Manager Phishing Ads on Google
Sentra raises $30M to streamline data securely across the public cloud
Cyber Insights 2023 | Quantum Computing and the Coming Cryptopocalypse
Google Shells Out $600,000 for OSS-Fuzz Project Integrations
A High-severity bug in F5 BIG-IP can lead to code execution and DoS
Prilex modification now targeting contactless credit card transactions
Scale Azure Firewall SNAT ports with NAT Gateway for large workloads
Corvus Supercharges Cyber Underwriters with Corvus Risk Navigator™
Industry voices complaints over short response window for $60B VA recompete
GitHub Breach: Hackers Stole Code-Signing Certificates for GitHub Desktop and Atom
QNAP Fixes Critical Vulnerability in NAS Devices with Latest Security Updates
South Korea makes crypto crackdown a national justice priority
Lack of emerging tech framework is ‘weakening’ US stance against China, lawmakers warn
i-PRO New Multi-Sensor Lineup, PTZ Cameras & New Analytics at ISC West
F5 Working on Patch for BIG-IP Flaw That Can Lead to DoS, Code Execution
Mitigate risk by integrating threat modeling and DevOps processes
Edgio Sponsors OWASP ModSecurity CRS to Further Advance Application Security Development
ExtraHop Partners with Binary Defense to Deliver Managed Network Detection and Response
Corvus Supercharges Cyber Underwriters with Corvus Risk Navigator™
Trace3 to Deliver Managed Detection and Response Service Powered by Deepwatch
Keyfactor Achieves Payment Card Industry Data Security Standard Compliance Certification
Study: Companies have upwards of 1,000 apps but only a third are integrated
AppSec Playbook 2023: Study of 829M Attacks on 1,400 Websites
Patch Critical Bug Now: QNAP NAS Devices Ripe for the Slaughter
Google Boosts Bounties For Open Source Flaws Found Via Fuzzing
Up To 29,000 Unpatched QNAP Storage Devices Are Sitting Ducks To Ransomware
CyberSaint STRONGER 2023 Conference Call for Speakers is Open!
IRONSCALES Enters 2023 Riding Significant Wave of Positive Momentum
Netflix password paid sharing amuses consumers to a certain extent
Lazarus Group Attack Identified After Operational Security Fail
Women in CyberSecurity Calls for Participants for New Measuring Inclusion Workshops
The Cybercrime Ecosystem Knits a Profitable Underground Gig Economy
A Nunavut Ransomware Incident Was Not Reported by Qulliq Energy
Prilex POS malware evolves to block contactless transactions
Is malware abusing your infrastructure? Find out with VirusTotal!
TrickGate: Malicious Software Outwitting Antivirus for 6 Years
Flaw in Cisco Industrial Appliances Allows Malicious Code to Persist Across Reboots
Cybersecurity Leaders Launch First Attack Matrix for Software Supply Chain Security
Managing the Governance Model for Software Development in a No-Code Ecosystem
Drupal Releases Security Update to Address a Vulnerability in Apigee Edge
Romance fraud losses rose 91% during the pandemic, claims UK’s TSB bank
Drupal Releases Security Update to Address a Vulnerability in Apigee Edge
NTT Partners with Palo Alto Networks to Deliver Managed Prisma SASE
LastPass Password Manager: increase this setting to improve security significantly
HeadCrab Botnet Ensnares 1,200 Redis Servers for Cryptomining
Civilian Harm Mitigation: An Opportunity for Values-Based U.S. Leadership at NATO
What SOCs Need to Know About Water Dybbuk, A BEC Actor Using Open-Source Toolkits
Cybersecurity Budgets Are Going Up. So Why Aren’t Breaches Going Down?
New Russian-Backed Gamaredon’s Spyware Variants Targeting Ukrainian Authorities
Experts warn of two flaws in popular open-source software ImageMagick
EV Charging Management System Vulnerabilities Allow Disruption, Energy Theft
Cyber Insights 2023: Quantum Computing and the Coming Cryptopocalypse
AI Transcription Service vs. Human Transcription: How to Decide?
OAuth Explained: A Guide to Understanding What It Is and How It Works
Super Bock says ‘cyber’ nasty ‘disrupting computer services’
Over 1800 Android Mobile App Web Injects for Sale on Hacking Forums
North Korean Hackers Exploit Unpatched Zimbra Devices in ‘No Pineapple’ Campaign
Cybersecurity budgets are going up. So why aren’t breaches going down?
InTheBox Threat Actor Sells Over 1,800 Web Injects on Cybercrime Forums
Ransomware conversations: Why the CFO is pivotal to discussing and preparing for risk
Application Security for Microservices: API Gateway, Service Mesh, and More
600,000 Server-Side Iterations: Bitwarden’s Latest Update Takes Security to the Next Level
Less is more: Conquer your digital clutter before it conquers you
Lazarus Group Rises Again, to Gather Intelligence on Energy, Healthcare Firms
New Prilex Malware Blocks Contactless Payments to Steal Credit Card Data
New Threat: Stealthy HeadCrab Malware Compromised Over 1,200 Redis Servers
How to Address the Requirements of Personal Data Protection (PDP) Law of Indonesia
Over 30k Internet-Exposed QNAP NAS hosts impacted by CVE-2022-27596 flaw
LockBit Ransomware Attack on ION and Expeditors faces $2m lawsuit from customer
New UN cybercrime convention has a long way to go in a tight timeframe
Threat actors abuse Microsoft’s “verified publisher” status to exploit OAuth privileges
50% of organizations have indirect relationships with 200+ breached fourth-party vendors
Janes Secures Sam Gordy as President of Janes US via Benchmark Executive Search
InterVision enhances its cloud and security services for mid-market organizations
Hornetsecurity unveils two tools to counter rise in phishing attacks and malicious links
Neustar Security Services introduces UltraDDR for DNS-based user protection
Certa joins forces with Sayari to improve third party management
Zscaler Resilience prepares businesses for unpredictable events
Sentra raises $30 million to meet growing demand for data security in the cloud
Dremio and Privacera enhance data security governance capabilities on data lakehouses
SAP partners with Red Hat to enhance intelligent business operations
Privacera connects to Dremio’s data lakehouse to aid data governance
Guardz debuts with cybersecurity-as-a-service for small businesses
New “MITRE ATT&CK-like” framework outlines software supply chain attack TTPs
Up to 10 million people potentially impacted by JD Sports breach
GitHub revokes several certificates after unauthorized access
Malwarebytes earns AV-TEST Top Product awards for fifth consecutive quarter
Check Point Software Join Forces with Samsung to Elevate Mobile Security
Kurt Gaudette joins Dragos as VP of Global Threat Intelligence
Google boosts bounties for open source flaws found via fuzzing
Check Point Software takes 1st Place in Independent Test of Top Network Firewalls
Dashboard helps city track diversity, equity, inclusion progress
Digital Health Company Allegedly Sold Sensitive Health Information To Facebook
Inside Killnet: Pro-Russia Hacktivist Group’s Support and Influence Grows
No experience, No Problem – (ISC)² Recruits 140,000 Individuals Interested in a Cybersecurity Career
Real Talk with CCSPs An interview with Vanessa Leite, CCSP, CISSP
Radiant Logic Signs Definitive Agreement to Acquire Brainwave GRC
Researchers Uncover New Bugs in Popular ImageMagick Image Processing Utility
Flipper Zero: How to install third-party firmware (and why you should)
Password-stealing “vulnerability” reported in KeePass – bug or feature?
Reduce Data Breaches by Adding a Data Privacy Vault to Your HealthTech App Architecture
Cybersecurity organizations fight back against rise of emotet and omnatuor malvertising
R&D funding vehicle could supercharge small biz innovation programs
Singapore, EU digital pact to cover ‘all areas’ of bilateral cooperation
Microsoft sweeps up after breaking .NET with December security updates
IoT, connected devices biggest contributors to expanding application attack surface
BrandPost: Is Your Organization Security Resilient? Here’s How to Get There
Why you might not be done with your January Microsoft security patches
US DOJ applies carrot-and-stick approach to Foreign Corrupt Practices Act policy
Misconfiguration and vulnerabilities biggest risks in cloud security: Report
Cybersecurity sees rise of emotet and the omnatuor malvertising
Va. regulators propose easing emission limits for data centers over power transmission concerns
Beating the Odds: 3 Challenges Women Face in the Cybersecurity Industry
Attackers Abuse Microsoft’s Verified Publisher Status To Steal Data
Vulnerability in Cisco industrial appliances is a potential nightmare (CVE-2023-20076)
Security in Style: Perimeter 81 Releases Limited Edition Fashion Capsule
98% of Firms Have a Supply Chain Relationship That Has Been Breached: Analysis
VMware Confirms Exploit Code Released for Critical vRealize Logging Vulnerabilities
VMware Releases Security Update for VMware vRealize Operations
Microsoft: We are tracking these 100 active ransomware gangs using 50 types of malware
Google Fi Confirms Data Breach, Hints At Link to T-Mobile Hack
VMware Releases Security Update for VMware vRealize Operations
Security in gaming: How to Recognize and Prevent Social Engineering Attacks in Gaming
Praetorian Appoints Peter Kwan as Vice President of Engineering
The top 8 Cybersecurity threats facing the automotive industry heading into 2023
Server-Side Request Forgery Attack Explained: Definition, Types, Protection
Where Do the Most Ransomware Attacks Take Place in the United States?
Ransomware attack shuts down Nantucket Public Schools and University of Iowa Hospitals
Anker Confirms Eufy Cameras Not Fully Encrypted, Raising Concerns
Hackers Abuse Microsoft’s ‘Verified Publisher’ OAuth Apps to Hack Organizations Cloud
Gem Security Gets $11 Million Seed Investment for Cloud Incident Response Platform
Researchers Claim High-Risk Vulnerabilities Found in 87% of All Container Images
Command-Injection Bug in Cisco Industrial Gear Opens Devices to Complete Takeover
New Prilex PoS Malware evolves to target NFC-enabled credit cards
Insider Attacks Becoming More Frequent, And Difficult Gurucul Report
Gem Security shows detection and response key to cloud security, raises $11M
ManageEngine Study Finds United States Enterprises Hit by Short-Staffed Security Operations Centers
KnowBe4 to Offer $10,000 to Black Americans in Cybersecurity Scholarship
Checkmarx Launches Threat Intelligence for Open Source Packages
Central Bank Immunity, Afghanistan, and Judgments Against the Taliban
Safer Internet Day: Experts Reveal 7 Tips To Avoid DeepFake Scams
How Crypto & Blockchain Technology Changed the Way Casinos Do Business
Microsoft warning: These phishing attackers used fake OAuth apps to steal email
The dark side of Optimize Mac Storage: What you need to know if you rely on it
Almost all Organizations are Working with Recently Breached Vendors
Experts Warn of ‘Ice Breaker’ Cyberattacks Targeting Gaming and Gambling Industry
New Versions of Prilex POS Malware Can Block Contactless Transactions
Improve your AWS security posture, Step 3: Encrypt AWS data in transit and at rest
Why confidential computing will be critical to (not so distant) future data security efforts
Unpatched Econolite Traffic Controller Vulnerabilities Allow Remote Hacking
Digital Project Design Brief: A Key to Effective Partnership
30k Internet-Exposed QNAP NAS Devices Affected by Recent Vulnerability
Prilex PoS Malware Blocks NFC Transactions to Steal Credit Card Data
New SH1MMER Exploit for Chromebook Unenrolls Managed ChromeOS Devices
Maximize Security with Bitwarden’s Latest Update: 600,000 Server-Side Iterations
KeePass Password Manager Vulnerability: Is Your Data at Risk?
China “Deeply Concerned” At US Halt Of Export Licences For Huawei
GitHub Breach – Hackers Stole Code Signing Certificates From Repositories
The State of the US National Cybersecurity Strategy for the Electric Grid
New LockBit Green ransomware variant borrows code from Conti ransomware
Anker admits its Eufy security cameras were not end-to-end encrypted
Threat Actors Gained Access to Google Fi Customers’ Information
Prilex PoS Malware Evolves to Block Contactless Payments to Steal from NFC Cards
Key Insights From the Guide to Cybersecurity Trends and Predictions for 2022-23
US Official Confirms Japan, Netherlands Joined US China Chip Sanctions
Why performing security testing on your products and systems is a good idea
TrickGate, a packer used by malware to evade detection since 2016
Hackers Abused Microsoft’s “Verified Publisher” OAuth Apps to Breach Corporate Email Accounts
KeePass Password Manager vulnerability: what you need to know
Attackers abuse Microsoft’s ‘verified publisher’ status to steal data
As the anti-money laundering perimeter expands, who needs to be compliant, and how?
Hackers Abused Microsoft’s “Verified Publisher” OAuth Apps to Hack Corporate Email Accounts
Ransomware Attacks on the Small and Medium Businesses are on the Rise
70% of CIOs anticipate their involvement in cybersecurity to increase
ERI Brings Carbon Neutral, SOC 2 Compliant Circular Economy Innovations to Indiana Businesses
Bridge Security Advisors Names Brian Jeffords Chief Revenue Officer
Matt DeFrain Promoted to Managing Director and CORe Practice Leader at MorganFranklin Consulting
SentinelOne and KPMG Announce Alliance to Accelerate Cyber Investigations and Response
ThreatSpike Red makes offensive cybersecurity accessible to more organizations
OTAVA releases Security as a Service to protect users against all attack vectors
Trulioo identity verification platform helps businesses achieve regulatory compliance
GroupSense VIP Monitoring service enables enterprises to proactively protect executives
Mix of legacy OT and connected technologies creates security gaps
Additional Supply Chain Vulnerabilities Uncovered in AMI MegaRAC BMC Software
GitHub Reports Code-Signing Certificate Theft in Security Breach
How Can Disrupting DNS Communications Thwart a Malware Attack?
2023-01-31 – BB12 Qakbot (Qbot) with Cobalt Strike and VNC traffi
BOXX Insurance raises $14.4 million to help customers stay ahead of cyber threats
Red Hat and Oracle expand collaboration to standardize cloud operations
Facebook Bug Discovered That Allowed Anyone To Bypass Two-Factor Authentication
IT Army of Ukraine gained access to a 1.5GB archive from Gazprom
House lawmakers want VA’s $20 billion-plus electronic health record program to improve or else
NASA SEWP director echoes concerns over looming deadlines for software providers
The FCC Broadband Maps: Meet the New Maps, Same as the Old Maps
Energy Department wants national labs to drive regional innovation
Critical VMware RCE Vulnerabilities Targeted by Public Exploit Code
Microsoft upgrades Defender to lock down Linux gear for its own good
Singapore can now order social media sites to block access, as ‘online safety’ law kicks in
Microsoft upgrades Defender to lock down Linux devices for their own good
Phishers Trick Microsoft Into Granting Them ‘Verified’ Cloud Partner Status
EFF Files Amicus Briefs in Two Important Geofence Search Warrant Cases
Setting the Record Straight: EFF Statement in Support of FCC Nominee Gigi Sohn
ChatGPT Clone Apps Collecting Personal Data on iOS, Play Store
Experts released VMware vRealize Log RCE exploit for CVE-2022-31706
Two Steps Forward, One Step Back on Vaccine Privacy in New York
GitHub Says Hackers Cloned Code-Signing Certificates In Breached Repository
GitHub Confirms Signing Certificates Stolen in Cyber-Attack, Revokes Them
USPS signs data management contract worth up to $70M with Veritas Technologies
KeePass Disputes Report Of Flaw That Could Exfiltrate A Database
Bill Targets Suicide Hotline Vulnerabilities After Cyberattack On Intrado
South Korea Makes Crypto Crackdown A National Justice Priority
DOD instructs acquisition teams to prioritize small business engagement over best-in-class contracts
DocuSign Brand Impersonation Attack Bypasses Security Measures, Targets Over 10,000
ManageEngine Study Finds United States Enterprises Hit by Short-staffed Security Operations Centers
Advanced IT Concepts (AITC) Names New Chief of Cyber and Technology Programs
Menlo Security Cloud Security Platform Receives FedRAMP® Authorization
Stories from the SOC – RapperBot, Mirai Botnet – C2, CDIR Drop over SSH
Russia Killnet launches DDoS attack on Netherlands and the United States
New Survey Reveals 40% of Companies Experienced a Data Leak in the Past Year
NanoLock Addresses Global Industrial & OT Cyber Demand with Expansions into Europe and North America
Hackers Stole GitHub Desktop and Atom Code-Signing Certificates
Generated on 2023-02-05 23:59:24.244341