If you’ve landed here, chances are you know just how challenging getting SOC 2 certification can be. Dealing with manual processes, spreadsheets, and endless piles of documentation can feel like a never-ending battle. I get it—it’s overwhelming and inefficient. In…
Tag: EN
Google Chrome Adds App-Bound Encryption to Protect Cookies from Malware
Google has announced that it’s adding a new layer of protection to its Chrome browser through what’s called app-bound encryption to prevent information-stealing malware from grabbing cookies on Windows systems. “On Windows, Chrome uses the Data Protection API (DPAPI) which…
Cencora Confirms Patient Data Stolen in Cyber-Attack
Pharma company Cencora confirmed in an updated SEC filing that sensitive personal and health data was exfiltrated by attackers in a February 2024 incident This article has been indexed from www.infosecurity-magazine.com Read the original article: Cencora Confirms Patient Data Stolen…
Cybersecurity News: Elections and DDoS, dating apps leak locations, Germany blames China
In today’s cybersecurity news… DDoS attacks won’t impact US elections CISA and the FBI issued a joint statement to this effect, saying that DDoS activity could at best make accessing […] The post Cybersecurity News: Elections and DDoS, dating apps…
What Is a Field CISO?
We’re increasingly seeing the industry fill up with Field CISOs. Why is the CISO out in the field? What does that role entail? Check out this post for the discussion […] The post What Is a Field CISO? appeared first…
Social Media Malvertising Campaign Promotes Fake AI Editor Website for Credential Theft
We uncovered a malvertising campaign where the threat actor hijacks social media pages, renames them to mimic popular AI photo editors, then posts malicious links to fake websites. This article has been indexed from Trend Micro Research, News and Perspectives…
Get an Extensive Education in Cybersecurity for Just $40
This extensive bundle includes nine courses and more than 50 hours of training in ethical hacking, Kali Linux, certification exams, and more. This article has been indexed from Security | TechRepublic Read the original article: Get an Extensive Education in…
Apple Extends Zero-Day Patch to Older Macs, Urges Immediate Update
Apple has released a critical zero-day patch for older Macs running macOS Monterey 12.7.6, addressing an actively exploited vulnerability (CVE-2024-23296). The flaw in Apple’s RTKit real-time OS could allow unauthorized access to kernel memory. This article has been indexed from…
E-Commerce Fraud Campaign Uses 600+ Fake Sites
The “Eriakos” info-stealing campaign is using hundreds of fake web shops to defraud victims This article has been indexed from www.infosecurity-magazine.com Read the original article: E-Commerce Fraud Campaign Uses 600+ Fake Sites
Where to find Talos at BlackHat 2024
This year marks the 10th anniversary of Cisco Talos, as the Talos brand was officially launched in August 2014 at Black Hat. This article has been indexed from Cisco Talos Blog Read the original article: Where to find Talos at…
CrowdStrike & Microsoft to Face Lawsuit from Delta Air Lines Following System Crash
Delta Air Lines has enlisted the legal expertise of David Boies, chairman of Boies Schiller Flexner, to seek damages from cybersecurity firm CrowdStrike and tech giant Microsoft. This follows a catastrophic system crash on July 19 that resulted in the…
Voice Over Wi-Fi Vulnerability Let Attackers Eavesdrop Calls And SMS
Users use Voice Over Wi-Fi (VoWiFi) quite frequently nowadays, as it’s a technology that enables them to make voice calls over a Wi-Fi network. This technology does so without relying on traditional cellular networks. Besides this, doing so allows the…
EvilProxy Phishing Kit Used in Over One Million Attacks Monthly
EvilProxy, known as the “LockBit of phishing,” is a popular phishing kit used in over a million attacks each month. It allows cybercriminals to launch ransomware infections, steal data, and compromise business emails. This article has been indexed from Cyware…
Lineaje Secures $20 Million in Funding To Address Software Supply Chain Issues
Lineaje has raised $20 million in a Series A funding round, led by Prosperity7 Ventures, Neotribe, and Hitachi Ventures, with Tenable Ventures also participating. This investment highlights the increasing demand for software supply chain security. This article has been indexed…
Synack PTaaS platform offers complete security testing suite
Synack has unveiled additional capabilities of its Penetration Testing as a Service (PTaaS) platform that deliver a comprehensive security testing experience. The Synack platform now covers all customers’ security testing needs, from attack surface discovery and analytics to penetration testing…
New Microsoft whitepaper shares how to prepare your data for secure AI adoption
In our newly released whitepaper, we share strategies to prepare for the top data challenges and new data security needs in the age of AI. The post New Microsoft whitepaper shares how to prepare your data for secure AI adoption…
BEC Attacks Surge 20% Annually Thanks to AI Tooling
A Vipre study reveals a 20% increase in business email compromise attacks This article has been indexed from www.infosecurity-magazine.com Read the original article: BEC Attacks Surge 20% Annually Thanks to AI Tooling
Beware of Fake AI Tools Masking a Very Real Malware Threat
Attackers disguise malicious tools as legitimate GenAI apps through phishing sites, web browser extensions, fake apps on mobile stores, and malicious ads on social media. This article has been indexed from Cyware News – Latest Cyber News Read the original…
Threat Actor Impersonates Google via Fake Ads for Authenticator
A threat actor recently impersonated Google through a fake ad for the Google Authenticator, a popular multi-factor authentication program. This resulted in innocent users unknowingly downloading malware or falling victim to phishing scams. This article has been indexed from Cyware…
How SquareX is Redefining Web Security: An In-Depth Discussion with Chief Architect Jeswin Mathai
In this episode, Tom Eston hosts Jeswin Mathai, Chief Architect at SquareX. This episode is part two of a series featuring SquareX, and Jeswin takes a deeper look into their cybersecurity solutions. Jeswin shares his extensive experience in the field…