-
New report identifies over $100B in potential government services savings
-
2023-06-14 – 30 days of Formbook: Day 10, Wednesday 2023-06-14 – “J0C7”
-
DOD needs more diverse emerging tech investment, Democratic caucus argues
-
Public preview: Improve Win32 app security via app isolation
-
Cadet Blizzard emerges as a novel and distinct Russian threat actor
-
LockBit victims in the US alone paid over $90m in ransoms since 2020
-
Zilla Security introduces new suite of identity security SaaS solutions
-
Windows Users Alert: Skuld Malware Steals Discord and Browser Data
-
Microsoft Outs New Russian APT Linked to Wiper Attacks in Ukraine
-
From Zero Trust To Secure Access: The Evolution of Cloud Security
-
Feds give states more flexibility in Medicaid redeterminations
-
Quantum Origin Onboard strengthens device security against cyberattacks
-
Absolute Software expands its SSE solution with Absolute Secure Web Gateway Service
-
Former DHS top buyer joins trade group to lead revived knowledge hub
-
Chinese Hackers Exploit VMware Zero-Day to Backdoor Windows and Linux Systems
-
Learnings from kCTF VRP’s 42 Linux kernel exploits submissions
-
Zscaler enhances Zero Trust Exchange platform to monitor and remediate large-scale attacks
-
Rezilion releases agentless runtime monitoring solution for vulnerability management
-
Kodem employs runtime intelligence to assess application risk for AppSec teams
-
This Hacker Outfit has Targeted Thousands of Companies Across the Globe
-
Challenges in Ensuring AI Safety: A Deeper Look into Complexity
-
Temporary Phone Number: An Essential Tool for Privacy Protection
-
PII Exposed: Unauthenticated IDOR in WooCommerce Stripe Plugin
-
CISA Instructs Federal Agencies to Secure Internet-Exposed Devices
-
Critical flaw found in WooCommerce Stripe Gateway Plugin used by +900K sites
-
Silent Push launches with a total of $10 million in total funding
-
Deloitte and AWS deliver ConvergeSECURITY to enable cloud transformation and adoption
-
Echoworx improves email security offerings with implementation of passkeys
-
Okta Device Access enables businesses to secure access to both devices and applications
-
Fake Security Researchers Deliver Malicious Zero-Day Exploits
-
Informatica bets big on data privacy with Privitar acquisition
-
How Popular Messaging Tools Instill a False Sense of Security
-
Severe Vulnerabilities Reported in Microsoft Azure Bastion and Container Registry
-
Capita wins £50M fraud reporting contract with City of London cops
-
Vodafone, Three Merger To Create UK’s Biggest Mobile Operator
-
Hundreds of Thousands of eCommerce Sites Impacted by Critical Plugin Vulnerability
-
How Ticket Scalping Impacts Asia’s Live Entertainment Industry
-
Sycope 2.3 detects network problems and identifies security threats
-
Wiz partners with Contrast Security to provide real-time insights into potential security risks
-
Lawmakers suggest ‘radical transparency’ as key to shoring up US cyber posture
-
Best Passkey Solutions for MFA, SSO & Passwordless Authentication
-
DTX highlights top 50 innovators driving digital change across the North West
-
The Ultimate Guide to Cloud Security: Protecting Your Data in the Digital Age
-
Threat Intelligence Firm Silent Push Launches With $10 Million in Seed Funding
-
Eviden AIsaac Cyber Mesh helps enterprises detect security threats
-
Behind the Scenes: Unveiling the Hidden Workings of Earth Preta
-
#InfosecurityEurope: (ISC)² and CIISec Release Guide to Inclusive Language in Cybersecurity
-
New Golang-based Skuld Malware Stealing Discord and Browser Data from Windows PCs
-
Unveiling the Balada injector: a malware epidemic in WordPress
-
ICS Patch Tuesday: Siemens Addresses Over 180 Third-Party Component Vulnerabilities
-
SAP Patches High-Severity Vulnerabilities With June 2023 Security Updates
-
Synopsys Recognised as a Leader in Software Composition Analysis by Independent Research Firm
-
Agencies Are Compelled to Secure All Internet-exposed Equipment by CISA Orders
-
#InfosecurityEurope: Cyber Leaders’ Plea to Tackle the Industry’s Mental Health Crisis
-
Fake Researcher Profiles Spread Malware through GitHub Repositories as PoC Exploits
-
Judge Grants FTC Injunction To Temporarily Block Microsoft-Activision Deal
-
Massive Phishing Campaign Uses 6,000 Sites to Mimic Popular Brands
-
New study: Threat actors harness generative AI to amplify and refine email attacks
-
Cyber Risk Quantification: A New Way to Understand Security Risks
-
The Wonderful Cybersecurity Community: Watching Past Employees Succeed
-
PCI DSS 4.0 Requirements – Protect from Malicious Software and Maintain Secure Systems and Software
-
Critical Security Vulnerability Discovered in WooCommerce Stripe Gateway Plugin
-
Zscaler unveils a set of security solutions designed to leverage the full potential of generative AI
-
Microsoft Releases Updates to Patch Critical Flaws in Windows and Other Software
-
Fueling Your Business: The Surprising Benefits of Natural Gas
-
Why performing security testing on your products and systems is a good idea
-
Microsoft to pay $20m penalty for collecting children info without consent
-
Microsoft Patches Critical Windows Vulns, Warns of Code Execution Risks
-
Beyond MFA: 3 steps to improve security and reduce customer authentication friction
-
Forrester names Microsoft a Leader in the 2023 Enterprise Email Security Wave
-
How Microsoft and Sonrai integrate to eliminate attack paths
-
Hackers Can Uncover Cryptographic Keys by Recording Footage of Power LEDs
-
Ignoring digital transformation is more dangerous than a recession
-
Enhancing security team capabilities in tough economic times
-
2023-06-13 – 30 days of Formbook: Day 9, Tuesday 2023-06-13 – XLoader “MD8S”
-
Watch CNBC’s full interview with Crowdstrike CEO George Kurtz
-
Crowdstrike CEO George Kurtz: New A.I. tool ‘Charlotte’ acts as a ‘virtual security analyst’
-
Florida man insists he didn’t violate the law by keeping Top Secret docs
-
Essential Insights on Google Cloud Backup and Disaster Recovery Service
-
Edge browser feature sends images you view back to Microsoft
-
Patch Tuesday fixes 4 critical RCE bugs, and a bunch of Office holes
-
Microsoft Patch Tuesday for June 2023 fixes 6 critical flaws
-
Windows PGM Accounts for Half of Patch Tuesday’s Critical Flaws
-
2 Russians charged in Mt. Gox Bitcoin heist and BTC-e money laundering
-
New phishing and business email compromise campaigns increase in complexity, bypass MFA
-
Dozens Of Suicide Hotlines Are Sending Sensitive Data To Facebook
-
Chinese Threat Actor Abused ESXi Zero-Day to Pilfer Files From Guest VMs
-
Analysis: Social Engineering Drives BEC Losses to $50B Globally
-
Cycode Launches CI/CD Pipeline Monitoring Solution (Cimon) to Prevent Supply Chain Attacks
-
Popular Apparel, Clothing Brands Being Used in Massive Phishing Scam
-
Spy agencies acquire commercial data with little coordination and few controls
-
CISA’s new directive targets devices that can be configured over public internet
-
Cyberattacks surge to 61% of small and medium-sized businesses, says study
-
U.S. Intelligence Has Amassed Sensitive And Intimate Data On Nearly Everyone
-
Fortinet Warns Customers Of Possible Zero Day Exploited In Limited Attacks
-
MSSQL Makes Up 93% Of All Activity On Honeypots Across 10 DBs
-
Hackers Can Steal Cryptographic Keys By Video Recording Power LEDs 60 Feet Away
-
June Patch Tuesday: VMware vuln under attack by Chinese spies, Microsoft kinda meh
-
Trade groups press White House to digitize forms of identification
-
New bill would give CISA greater cyber outreach responsibilities
-
Fortinet warns critical VPN vulnerability ‘may’ be under attack
-
June 2023 Patch Tuesday: Critical patches for Microsoft Windows, SharePoint, Exchange
-
Governor signs bill paving the way for state-level AI bill of rights
-
Lawmaker advocates ‘all-of-the-above’ approach to fix cyber worker shortage
-
As Kentucky’s largest coal producer mines bitcoin, its power discounts draw scrutiny
-
Microsoft Patches Critical Windows Vulns, Warn of Code Execution Risks
-
St. Margaret’s Health is the first hospital to cite a cyberattack as a reason for its closure
-
Last of the Gozi 3 sentenced over Windows info-stealing malware ops
-
Top 10 cybersecurity findings from Verizon’s 2023 data breach report
-
oak9 adds GitLab support to alert developers of security gaps
-
Google grants $12 million to bolster NYC’s cybersecurity ecosystem
-
UK’s Ofcom confirms cyber attack as PoC exploit for MOVEit is released
-
Gozi banking malware “IT chief” finally jailed after more than 10 years
-
CosmicEnergy ICS Malware Poses No Immediate Threat, but Should Not Be Ignored
-
Clop Ransomware gang strikes London Transport for London (TfL)
-
The role of cybersecurity in financial institutions -protecting against evolving threats
-
When internet security is a requirement, look to dedicated fiber
-
Beware: New DoubleFinger Loader Targets Cryptocurrency Wallets with Stealer
-
Cynerio partners with Microsoft to ensure the security of medical and IoT devices
-
Nvidia’s AI Software Raises Concerns Over Exposing Sensitive Data
-
Mountain View Hospital Restores Operations, Two Weeks Following the Cyberattack
-
Accused Cybercriminals: Russians Charged with Hacking Mt. Gox Crypto Exchange and Manages BTC-e
-
Government has a policy over people problem, civic tech leader argues
-
#InfosecurityEurope: Armis Highlights Riskiest Devices in Critical Infrastructure
-
Seceon unveils two products for MSPs and MSSPs to quantify risk
-
GuidePoint Security improves organizations’ security posture and ROI with its BASaaS
-
Are smartphone thermal cameras sensitive enough to uncover PIN codes?
-
Over Half of Security Leaders Lack Confidence in Protecting App Secrets, Study Reveals
-
DDoS threats and defense: How certain assumptions can lead to an attack
-
OneTrust enhances data policy engine to identify data security and privacy risks
-
Dragos Partner Program helps users strengthen OT cybersecurity
-
New Research Shows Potential of Electromagnetic Fault Injection Attacks Against Drones
-
Romanian Operator of Bulletproof Hosting Service Sentenced to Prison in US
-
Adversary-in-the-Middle Attack Campaign Hits Dozens of Global Organizations
-
BreachForums Returns Under the Control of ShinyHunters Hackers
-
Google’s ChromeOS aims for enterprise with security and compatibility
-
A database containing data of +8.9 million Zacks users was leaked online
-
Cato Networks Breaks SASE Speed Barrier (Again) With 5 Gbps Encrypted Tunnels to Sites and the Cloud
-
‘Aggressive’ China cyberattacks are the ‘defining threat’ of our time, top U.S. cyber official says
-
#InfosecurityEurope: What TechUK’s New Plan Means for Cybersecurity
-
PoC exploit for exploited MOVEit vulnerability released (CVE-2023-34362)
-
Automation Anywhere and Google Cloud join forces to accelerate the adoption of AI
-
AI-powered malware is a growing security concern, CyberArk survey finds
-
Strengthening Data Security: 5 Critical Controls to Protect Your Business
-
Ransomware Attack Played Major Role in Shutdown of Illinois Hospital
-
Bank of China Boosts Hong Kong Crypto With Tokenised Security
-
#InfosecurityEurope: Leading Cybersecurity Providers to Share Insights on Breach Containment
-
Two Russian Nationals Charged for Masterminding Mt. Gox Crypto Exchange Hack
-
Webinar – Mastering API Security: Understanding Your True Attack Surface
-
Fortinet urges to patch the critical RCE flaw CVE-2023-27997 in Fortigate firewalls
-
Zacks Investment Research Faces Larger Data Breach Affecting 8.8 Million Users
-
CoWIN Data Leak – Personal Data of COVID Vaccine Recipients Leaked on Telegram
-
Ethical AI and Responsible Data Science: What Can Developers Do?
-
#InfosecurityEurope: Top Five Things to Check Out at This Year’s Event
-
These Microsoft Office security signatures are ‘practically worthless’
-
What Is the Future of Virtual Reality (VR) in Casino Gaming?
-
Fortinet Warns Customers of Possible Zero-Day Exploited in Limited Attacks
-
Ransomware Insurance: Security Strategies to Obtain Coverage
-
Yaccarino Lays Out Vision For Twitter 2.0 As ‘Global Town Square’
-
UK communications regulator Ofcom hacked with a MOVEit file transfer zero-day
-
US charges two men with Mt. Gox heist, the world’s largest cryptocurrency hack
-
Incorporating cloud security teams into the SOC enhances operational efficiencies
-
Need to improve the detection capabilities in your security products?
-
Critical FortiOS and FortiProxy Vulnerability Likely Exploited – Patch Now!
-
UK telco watchdog Ofcom, Minnesota Dept of Ed named as latest MOVEit victims
-
Experts released PoC exploit for MOVEit Transfer CVE-2023-34362 flaw
-
2023-06-10 – 30 days of Formbook: Day 6, Saturday 2023-06-10 – “SN84”
-
2023-06-11 – 30 days of Formbook: Day 7, Sunday 2023-06-11 – GuLoader Formbook “XCHU”
-
2023-06-12 – 30 days of Formbook: Day 8, Monday 2023-06-12 – “EE2Q”
-
API Security: Unveiling Best Practices for a Secure Digital Ecosystem
-
Balancing User and Business Needs: The Key to Successful Digital Product Strategy
-
More MOVEit vulnerabilities found while the first one still resonates
Generated on 2023-06-14 23:55:30.995282