U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds SimpleHelp vulnerability to its Known Exploited Vulnerabilities catalog. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added a SimpleHelp vulnerability, tracked as CVE-2024-57727, to its Known Exploited Vulnerabilities (KEV) catalog. At the end…
Week in Review: CISA officials furloughed, DeepSeek’s weak security, Cairncross as cyberdirector
Link to episode page This week’s Cyber Security Headlines – Week in Review is hosted by Rich Stroffolino with guest Doug Mayer, vp, CISO, WCG Thanks to our show sponsor, Vanta Do you know the status of your compliance controls…
How to restrict Amazon S3 bucket access to a specific IAM role
February 14, 2025: This post was updated with the recommendation to restrict S3 bucket access to an IAM role by using the aws:PrincipalArn condition key instead of the aws:userid condition key. April 2, 2021: In the section “Granting cross-account bucket…
Why EPSS is a Game-Changer for Cybersecurity Risk Management
Having served on the MITRE.org CVE (OVAL) advisory board, I have spent years analyzing vulnerabilities and how they impact global cybersecurity. The challenge has always been prioritization—how do we determine… The post Why EPSS is a Game-Changer for Cybersecurity Risk…
SailPoint IPO Signals Bright Spot for Cybersecurity
In a signal move for the cybersecurity sector, identity and access management (IAM) vendor SailPoint has made its return to public markets. The post SailPoint IPO Signals Bright Spot for Cybersecurity appeared first on SecurityWeek. This article has been indexed…
Delinea Extends Scope of Identity Management Platform
Delinea this week updated its platform for managing identities to add a vault for storing managing credentials, analytic tools for tracking user behavior and a framework for automating the management of the lifecycle of an identity from onboarding to offboarding.…
New “whoAMI” Attack Exploits AWS AMI Name Confusion for Remote Code Execution
Cybersecurity researchers have disclosed a new type of name confusion attack called whoAMI that allows anyone who publishes an Amazon Machine Image (AMI) with a specific name to gain code execution within the Amazon Web Services (AWS) account. “If executed…
Perplexity just made AI research crazy cheap—what that means for the industry
Perplexity AI launches free Deep Research tool that matches $75,000/month enterprise AI capabilities, forcing OpenAI and Google to justify premium pricing while scoring higher on key benchmarks. This article has been indexed from Security News | VentureBeat Read the original…
9 Best Next-Generation Firewall (NGFW) Solutions for 2025
Explore the top next-generation firewall solutions. Assess features and pricing to discover the ideal NGFW solution for your needs. The post 9 Best Next-Generation Firewall (NGFW) Solutions for 2025 appeared first on eSecurity Planet. This article has been indexed from…
China-linked APT Salt Typhoon breached telecoms by exploiting Cisco router flaws
China-linked APT Salt Typhoon has breached more U.S. telecommunications providers via unpatched Cisco IOS XE network devices. China-linked APT group Salt Typhoon is still targeting telecommunications providers worldwide, and according to a new report published by Recorded Future’s Insikt Group,…
Lazarus Group Infostealer Malwares Attacking Developers In New Campaign
The notorious Lazarus Group, a North Korean Advanced Persistent Threat (APT) group, has been linked to a sophisticated campaign targeting software developers. This campaign involves the use of infostealer malware, designed to steal sensitive information from developers’ systems. The attack…
IT Security News Hourly Summary 2025-02-14 21h : 6 posts
6 posts were published in the last hour 19:32 : Chinese Cyber-Spies Use Espionage Tools for Ransomware Side Hustle 19:7 : N. Korean Hackers Suspected in DEEP#DRIVE Attacks Against S. Korea 19:7 : XELERA Ransomware Attacking Job Seekers With Weaponized…
Chinese Cyber-Spies Use Espionage Tools for Ransomware Side Hustle
A Chinese threat actor who targeted an Asian software company used the same toolset for the ransomware attack that was found in multiple cyberespionage incidents, leaving Symantec analysts to believe the hacker was a Chinese spy who used the malicious…
N. Korean Hackers Suspected in DEEP#DRIVE Attacks Against S. Korea
A phishing attack dubbed DEEP#DRIVE is targeting South Korean entities, with thousands already affected. North Korean hackers from… This article has been indexed from Hackread – Latest Cybersecurity, Tech, Crypto & Hacking News Read the original article: N. Korean Hackers…
XELERA Ransomware Attacking Job Seekers With Weaponized Word Documents
Job seekers have become the target of a sophisticated ransomware campaign in a recent cybersecurity threat, and this campaign dubbed as “XELERA.” This campaign uses fake job offers from the Food Corporation of India (FCI) to lure victims into opening…
12 Million Zacks accounts leaked by cybercriminal
A cybercriminal stole a reported 12 million data records on Zacks’ customers and clients. This article has been indexed from Malwarebytes Read the original article: 12 Million Zacks accounts leaked by cybercriminal
Congress is PISSED at British Backdoor Bid, but Apple Stays Shtum
Just meet me at the ADP: Sen. Ron Wyden and Rep. Andy Biggs got no love for the United Kingdom The post Congress is PISSED at British Backdoor Bid, but Apple Stays Shtum appeared first on Security Boulevard. This article…
Lazarus Group Deploys Marstech1 JavaScript Implant in Targeted Developer Attacks
The North Korean threat actor known as the Lazarus Group has been linked to a previously undocumented JavaScript implant named Marstech1 as part of limited targeted attacks against developers. The active operation has been dubbed Marstech Mayhem by SecurityScorecard, with…
Meta confirms ‘Project Waterworth,’ a global subsea cable project spanning 50,000 kilometers
Back in November, we broke the news that Meta — owner of Facebook, Instagram and WhatsApp, with billions of users accounting for 10% of all fixed and 22% of all mobile traffic — was close to announcing work on a…
Virginia Attorney General’s Office Struck by Cyberattack Targeting Attorneys’ Computer Systems
The chief deputy attorney general of the agency sent an email on Wednesday that said nearly all of is computer systems were offline. The post Virginia Attorney General’s Office Struck by Cyberattack Targeting Attorneys’ Computer Systems appeared first on SecurityWeek.…
Azul Achieves DORA Compliance
In December Azul announced that the integrated risk management practices for its OpenJDK solutions fully support the requirements of the European Union’s Digital Operational Resilience Act (DORA) provisions. The stability, resilience and integrity of Azul’s solution not only ensure DORA…
Meta confirms ‘Project Waterworth,’ a global subsea cable project spanning 50,000km
Back in November, we broke the news that Meta — owner of Facebook, Instagram and WhatsApp, with billions of users accounting for 10% of all fixed and 22% of all mobile traffic — was close to announcing work on a…
Introducing the AWS Trust Center
We’re launching the AWS Trust Center, a new online resource that shares how we approach securing your assets in the cloud. The AWS Trust Center is a window into our security practices, compliance programs, and data protection controls that demonstrates…
Upcoming Speaking Engagements
This is a current list of where and when I am scheduled to speak: I’m speaking at Boskone 62 in Boston, Massachusetts, USA, which runs from February 14-16, 2025. My talk is at 4:00 PM ET on the 15th. I’m…