-
Research From Quantum and ESG Reveals Top Challenges in Data Management
-
Tenable Launches Suite of New Features to Cloud-Native Application Security Platform
-
San Francisco Should Strengthen, Not Gut, Surveillance Technology Ordinance
-
SHOP SAFE Will Stomp Out Online Sales of Used and Homemade Goods
-
A worrying Etsy listing reveals the stalking potential of Apple’s AirTags
-
Let’s go phishing: How we could enter a new era of email trust
-
DHS Launches Cyber Safety Review Board to Analyze Major Vulnerability Events
-
Privacy Shield: EU citizens might get right to challenge US access to their data
-
Great Resignation Increases Security Risks For Businesses, Warns Tessian
-
Facebook Suffers $10 Billion Loss Because Of Privacy Changes
-
The Chatter Podcast: The Olympics, Politics, and Security with Ethan Scheiner
-
Phishing kits’ use of man-in-the-middle reverse proxies is growing, warns Proofpoint
-
This book has an awful title, but says a lot of great things
-
Prosecutors investigating cyberattacks affecting multiple Belgian and Dutch ports
-
DOD’s testing chief wants cloud contracts to allow for more security checks
-
Conti gang hits KP Snacks with a crippling ransomware attack
-
Antlion APT group used a custom backdoor that allowed them to fly under the radar for months
-
JumpCloud joins the patch management crowd, starting with Windows and Mac updates
-
It’s Back: Senators Want EARN IT Bill to Scan All Online Messages
-
Intel expands Bug Bounty program with ‘Project Circuit Breaker’ effort
-
Wormhole Crypto Platform: ‘Funds Are Safe’ After $314M Heist
-
The state of AI ethics: The principles, the tools, the regulations
-
Education Provider Infosec Announces New Cybersecurity Scholarships
-
Defending Against Critical Threats: Analyzing Key Trends, Part 1
-
Faxes and snail mail: Will pandemic-era flaws unleash improved health technology?
-
#Enigma2022: Contextual Security Should Supplement Machine Learning for Malware Detection
-
MacRumors Exclusive: Get 20% Off Brydge’s Popular iPad Keyboards and MacBook Vertical Dock
-
KP Snacks hit by ransomware: Crisps and nuts firm KO’d by modern scourge
-
Report: 79% of ML teams say they ‘lack access’ to data needed to identify bias and ethics issues
-
S3 Ep68: Bugs, scams, privacy …and fonts?! [Podcast + Transcript]
-
Businesses’ Top Concerns Operating Cloud-native Technologies
-
Top-Ranking Banking Trojan Ramnit Stealing Payment Card Data
-
Iranian Hackers Employs PowerShell Backdoor to Bypass Security Products
-
Wormhole hack – Hackers steal $320M in one of the largest crypto heists
-
Sale of ‘Silent AirTags’ on eBay and Etsy Raises Privacy Concerns
-
Bitcoin miners are helping the Texas grid brace for winter storm impact
-
Telco Penalized €9 Million for Obscuring Cyberattack Impact from Customers
-
More than 90% of Russians do not Finish Reading User Agreements on the Internet
-
Meta Stock Suffers, As Facebook Looses Daily Users For First Time
-
Black History Month: Diversity in Cybersecurity Is More Important than Technology
-
Oil terminals in Europe’s biggest ports hit by a cyberattack
-
Apple Launches New iPhone 13 Product Pages Highlighting Key Features
-
New Year, Same Risks? Six Cyber Resilience Resolutions for a Safer 2022
-
Hackers Went Wild in 2021 — Every Company Should Do These 5 Things in 2022
-
Critical Flaws Discovered in Cisco Small Business RV Series Routers
-
As major winter storm descends on Texas, bitcoin miners are helping the power grid brace for impact
-
Keeper Security acquires Glyptodon to enhance privileged access management platform
-
Cybersecurity: Many managers just don’t want to understand the risks
-
Apple Did Not Mislead Customers About iPhone Water Resistance, Federal Judge Rules
-
Cyber Signals: Defending against cyber threats with the latest research, insights, and trends
-
Microsoft: ‘Dangerous mismatch’ in security due to slow MFA adoption
-
10 Best Laptops Under $200 in 2022 – Review and Buying Guide
-
Microsoft: This Mac malware is getting smarter and more dangerous
-
CISA Adds Eight More Flaws To Its Exploited Vulnerabilities Catalogue
-
New SEO Poisoning Campaign Is Wreaking Havoc on the Cyberthreat Landscape
-
3D printed guns, underground markets, bomb manuals: police crackdown continues
-
More than $8 million made from NFT wash trading: Chainalysis
-
Critical Vulnerabilities Found in Sealevel Device Used in ICS Environments
-
Execs keep flinging money at us instead of understanding security, moan infosec pros
-
Shuckworm Group uses Weaponized Word Document to Infect Victims Computer
-
Cisco Patches Critical Vulnerabilities in Small Business RV Routers
-
FBI Admits Procurement Of NSO’s Pegasus For ‘Product Testing’
-
Ransomware Often Hits Industrial Systems, With Significant Impact: Survey
-
China condemns US ban on telco, urges need for fair treatment
-
New SEO Poisoning Campaign Distributing Trojanized Versions of Popular Software
-
CARROT Weather Gets Redesigned Maps With 3D Globe View, Forecast Layers, and More
-
Hackers steal $326 million from blockchain platform Wormhole
-
[updated]Cyberattack on fuel supplier causes supply chain disruption
-
Welsh home improvement biz fined £200,000 over campaign of 675,478 nuisance calls
-
Financially Motivated Hackers Use Leaked Conti Ransomware Techniques in Attacks
-
Obrela acquires Encode to become one of Europe’s largest MDR players
-
New Variant of UpdateAgent Malware Infects Mac Computers with Adware
-
Apple’s Privacy Measures to Cost Facebook $10 Billion in 2022
-
Over 100,000 Files with Student Records from the British Council were Discovered Online
-
Apple Awards Bounty of $100,500 for Finding Flaws in MacBook
-
New Wave of Cyber Attacks Target Palestine with Political Bait and Malware
-
Building confidence in your system’s security with chaos engineering
-
eSafety worried proposed anti-trolling laws may be used in vigilante-style justice
-
FBI says more cyber attacks come from China than everywhere else combined
-
Apple Inc pays $100,500 to hacker for hacking MacBook Webcam
-
DHS official to chair Biden-ordered cyber safety review board
-
How are collaboration apps fairing in remote work environments?
-
Supply chain situation: All the numbers are working in our favor, says Port of Los Angeles
-
Unsecure Amazon S3 bucket Exposes IDs of Airport Security Employees
-
Cybersecurity in Competitive Online Gaming (Cheating, Mitigation, and Vulnerabilities)
-
Appgate secures Kubernetes workloads with cloud-native zero trust functionality
-
Codenotary Cloud identifies vulnerabilities in software development lifecycle
-
Mandiant Advantage Attack Surface Management allows security teams to operationalize intelligence
-
Limelight Layer0 Security protects against malicious website attacks
-
Cynamics launches cloud NDR to strengthen network monitoring and detection capabilities
-
UEFI firmware vulnerabilities affecting Fujitsu, Intel and more discovered
-
Keepit for Azure AD offers protection against accidental deletions and ransomware
-
Qualys minimizes vulnerability risk for organizations with new remediation feature
-
Gretel’s privacy engineering toolkit guards synthetic data against adversarial attacks
-
PingOne DaVinci provides no-code identity orchestration capabilities for enterprises
-
Juniper Secure Edge empowers customers to protect remote workforces from anywhere
-
Linux Legend “maddog” Shares Exclusive Security Insights with LinuxSecurity>
-
More than $320 million stolen in latest apparent crypto hack
-
Worried about occasional npm malware scares? They’re more common than you may think
-
CoreStack collaborates with Maureen Data Systems to offer cloud governance for managed services
-
Contrast Security partners with GitHub to deliver pipeline-native security to developers
-
Cybellum integrates with Siemens Polarion to drive vulnerability management under one platform
-
Shoulder surfing: Watch out for eagle‑eyed snoopers peeking at your phone
-
Sideloading Bill Would Allow ‘Malware, Scams and Data-Exploitation to Proliferate,’ Says Apple
-
Arctic Wolf acquires Tetra Defense to expand incident readiness solutions
-
Vaultree joins Global Cyber Alliance to create a safer online community
-
Anjuna Security expands executive team with four industry executives
-
Water Wars: Japan Focused on Defense Expansion, while U.S. Makes a Soft-Power Push
-
White House cyber office ‘expects to lead’ on workforce strategy
-
If My Organization Is Mostly in the Cloud, Do I Need a Firewall?
-
Facebook Celebrates Data Privacy Day By Recapping Year Of Efforts
-
WhiteSource Threat Report Reveals Massive Uptick In Cyberattacks Related To JavaScript npm
-
INKY Completes Email Security Offering With Launch of Outbound Mail Protection
-
Cato Networks Delivers Instant Visibility and Control of Cloud Application Data Risk
-
Purple Teaming Security Management Firm PlexTrac Raises $70 Million
-
Top cybersecurity leadership challenges and how to solve them
-
NY spearheads regional, data-driven approach to tracing illegal guns
-
Thousands of Data Center Management Apps Exposed to Internet
-
Threating hunting: Your best defense against unknown threats
-
Market research & conferencing service Civicom exposed 8TB of Data
-
Researcher found an Information Disclosure in the Brave browser
-
Japan Focused on Defense Expansion, while U.S. Makes a Soft-Power Push
-
Cyber Defense Media Group – 10 Year Anniversary – Daily Celebration in 2022
-
Alphabet Posts Record Results, Announces 20 for 1 Stock Split
-
TrickBot Gang Uses Template-Based Metaprogramming in Bazar Malware
-
Report: 75% of security leaders seek to implement edge use cases
-
The Real-World Impact of the Global Cybersecurity Workforce Gap on Cyber Defenders
-
Remote code execution vulnerability in Samba due to macOS interop module
-
Elementor WordPress plugin has a gaping security hole – update now
-
Metaverse tech could exacerbate today’s privacy problems, says Superset’s Tom Chavez
-
Tribal broadband effort gets $1.5 million federal investment
-
AT&T completes first 5G demonstration for ‘smart warehouse’ effort
-
Meet CoinStomp: New cryptojacking malware targets Asian cloud service providers
-
Trend Micro Patches Vulnerabilities in Hybrid Cloud Security Products
-
Notorious Spyware Firm Reportedly Offered Bags Of Cash For Access To US Networks
-
Deals: Get Up to $50 Off Apple Watch Series 7 Models on Amazon
-
UK think tank proposes Online Safety Bill reviewer to keep tabs on Ofcom decisions
-
Insider Threat Alert as employees take data while leaving a Job
-
Security automation startup Cerby raises $12M to secure non-IT-managed apps
-
BlackCat ransomware implicated in attack on German oil companies
-
1,300 Malicious Packages Found in Popular npm JavaScript Package Manager
-
Expert Insights: SAP & Yale Team Up To Promote Diversity In Cybersecurity Hiring
-
2,77,000 Routers Vulnerable to ‘Eternal Silence’ Assaults via UPnP
-
Iranian APT MuddyWater Targets Turkish Public and Government Entities
-
Introduction to Overhide-Ledger and Ledger-Based Authentication
-
Olympic Athletes Advised by FBI to Bring ‘Burner’ Phones to Beijing
-
TikTok’s Roland Cloutier: How CISOs Can Foster a Culture of Security & Transparency
-
More Than Half Of Ransomware Attacks Target Three Industries
-
What You Need to Do Today to Protect Against Account Takeover Attacks
-
Meet CoinStomp: new cryptojacking malware targets Asian cloud service providers
-
Tens of Thousands of Websites Vulnerable to RCE Flaw in WordPress Plug-in
-
Telegram Gains Better Reactions, Video Stickers, Interactive Emoji, and More
-
REvil took a hit by Russia’s FSB but may not be shut down yet
-
Arid Viper hackers strike Palestine with political lures – and Trojans
-
Announcing the public preview of Microsoft Azure Payment HSM service
-
FTC To Review Microsoft Activision Buy, As Sony Acquires Bungie
-
Passage Emerges From Stealth With Biometric User Authentication Platform
-
#Enigma2022: Pandemic Misinformation Reveals Challenges for Online Health Information
-
ESET releases fixes for local privilege escalation bug in Windows Applications
-
Cato Networks delivers first CASB for instant visibility and control of cloud application data risk
-
PlexTrac lands $70M to automate mundane tasks for security teams
-
SureMDM Vulnerabilities Expose Organizations to Supply Chain Attacks
-
FBI warning: Scammers are posting fake job ads on networking sites to steal your money and identity
-
Microsoft Defender for Endpoint now spots unpatched bugs in iOS and Android devices
-
Third of Employees Admit to Exfiltrating Data When Leaving Their Job
-
New Malware Used by SolarWinds Attackers Went Undetected for Years
-
Samba Patches Critical Flaws That Earned Researchers Big Rewards
-
FBI Warns of Potential Cyberattacks Targeting 2022 Winter Olympics
-
Experts warn of a spike in APT35 activity and a possible link to Memento ransomware op
-
ESET Patches High-Severity Vulnerability in Windows Applications
-
Samba Vulnerability Can Trigger RCE and Complete Root User Access
-
Samba bug may allow code execution as root on Linux machines, NAS devices (CVE-2021-44142)
-
Scottish Agency Still Recovering from 2020 Ransomware Attack
-
DMCA-dot-com XSS vuln reported in 2020 still live today and firm has shrugged it off
-
Business leaders are confident in their defences, despite over half falling victim to ransomware
-
How Dangerous Is Log4Shell and How it Affects the Java Industry?
-
The Samba Vulnerability: What is CVE-2021-44142 and How to Fix It
-
Experts found 23 flaws in UEFI firmware potentially impact millions of devices
-
68K People Who Received Services from Advocates were Affected by Data Theft
-
How to measure security efforts and have your ideas approved
-
Dozens of Security Flaws Discovered in UEFI Firmware Used by Several Vendors
-
Two initiatives that can move the needle for cybersecurity in 2022
-
Hacker Group ‘Moses Staff’ Using New StrifeWater RAT in Ransomware Attacks
-
Product showcase: Cybellum’s Product Security Lifecycle Platform
-
NSO Group of Pegasus Spyware wanted to access global signaling network
-
Rush to remote work left sysadmins struggling to keep businesses safe
-
Critical Bug Found in WordPress Plugin for Elementor with Over a Million Installations
-
Persistent data breaches fueling developer interest in cybersecurity
-
Automotive cybersecurity market size to reach $5.3 billion by 2026
-
Cymulate Amplify helps companies eliminate critical security blind spots
-
DrawnApart – A New Fingerprinting Technique Used to Track Your Activities Online
-
Guardsquare extends protection offering for Flutter to prevent tampering and reverse engineering
-
Cato CASB protects enterprises against data breach and cloud-delivered threats
-
GuidePoint Security unveils Zero Trust Workshops to improve zero trust adoption for customers
-
Quantifind Graphyte platform now available on Microsoft Azure
-
Picus Security joins MISA to protect critical data and assets against cyber attacks
-
Eseye and Armis launch a solution to secure connected devices on cellular networks
-
Accenture names Manish Sharma as COO and Yusuf Tayob as Group Chief Executive of Operations
-
Talon Cyber Security raises $43 million to support the high demand for secure hybrid work
-
Pixm raises $4.3 million to protect enterprises from phishing attacks
-
Cengage Group acquires Infosec to expand into the cybersecurity professional training market
-
Update now: Samba prior to 4.13.17 hit with remote root code execution bug
-
Secure Web Browsers Tackle Ransomware, Insider Threat in Enterprises
-
Noname Security appoints Filip Verloy as Technical Evangelist for EMEA
Generated on 2022-02-03 23:55:26.727169