US government reminds the public that a reward of up to $10 million is offered for information on cybercriminals, including members of the Hive operation. The post US Reiterates $10 Million Reward Offer After Disruption of Hive Ransomware appeared first…
Microsoft: Update On-Premises Exchange Server Now
Attacks are not going away, tech giant warns This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Microsoft: Update On-Premises Exchange Server Now
NASA And DARPA To Develop Nuclear Rocket Engines For Mars
Partnership between NASA and DARPA seeks to develop nuclear thermal rocket engine for upcoming Mars missions This article has been indexed from Silicon UK Read the original article: NASA And DARPA To Develop Nuclear Rocket Engines For Mars
AI in cybersecurity: The good, the bad, and the ugly
Artificial intelligence (AI) is rapidly becoming a powerful tool in the cybersecurity landscape, with the potential to revolutionize the way we detect and respond to cyber threats. However, as with any technology, there are also risks associated with the use…
CVE-2023-23560 flaw exposes 100 Lexmark printer models to hack
Lexmark released a security firmware update to fix a remote code execution flaw, tracked as CVE-2023-23560, that impacts more than 100 printer models. Lexmark has released a security firmware update to address a remote code execution vulnerability, tracked as CVE-2023-23560,…
Savvy cybersecurity pros benefit from host of free resources to step up fight against hackers and cyber threats
Sign up to SANS Institute to keep up to speed with all aspects of the fast-evolving infosec sector Sponsored Post They say there’s no such thing as a free lunch, but in fact there’s a veritable feast of valuable resources…
Want your endpoint security product in the Microsoft Consumer Antivirus Providers for Windows?
BlackCat Ransomware gang stole secret military data from an industrial explosives manufacturer
The BlackCat Ransomware group claims to have hacked SOLAR INDUSTRIES INDIA and to have stolen 2TB of “secret military data.” The BlackCat Ransomware gang added SOLAR INDUSTRIES INDIA to the list of victims published on its Tor leak site. The…
3 business application security risks businesses need to prepare for in 2023
Ransomware has lately been the primary method of monetization for threat actors. Still, research has revealed a slight decrease in ransomware attacks and ransomware payments this past year, suggesting cybercriminals are evolving their strategies. Threat actors have been leveraging more…
New infosec products of the week: January 27, 2023
Here’s a look at the most interesting products from the past week, featuring releases from Perimeter 81, SpyCloud, ThreatConnect, Venafi, and Wallarm. SpyCloud Compass identifies infected devices accessing critical workforce apps SpyCloud Compass enables organizations to reduce their risk of…
UK Cyber Security Centre’s scary new story: One phish, two phish, Russia phish, Iran phish
Nice people on LinkedIn want to harvest logins from politicians, boffins, and defense types The UK’s National Cyber Security Centre (NSCS) has warned of two similar spear-phishing campaigns, one originating from Russia, the other from Iran.… This article has been…
Cyber Attack news headlines trending on Google
Zacks Investment is the first firm that has hit the headlines of Google regarding data compromise and sources add that a single hack that took place between 2021 and 2022 result in the leak of information belonging to 820,000 customers.…
BING will not get enhanced with Microsoft AI investment of $10 billion
As soon as Microsoft announced a $10 billion investment on AI firm OpenAI developed ChatGPT, trade analysts suggested that the investment will also boost the search engine capabilities of Bing, the business unit of the Windows giant. But now the…
50% of organizations exceed their budgeted spend on cloud storage
Enterprises are going all-in on cloud storage, with average stored capacity in the public cloud expected to reach 43% of their total storage footprint by 2024, and the vast majority (84%) are increasing their budgets to make that a reality,…
Open source skills continue to be in high demand
80% of organizations increased their use of open source software over the last 12 months, according to Perforce Software and the Open Source Initiative. Four out of five companies rely on OSS for a wide range of business-critical applications including…
RealDefense Acquires SUPERAntiSpyware From Support.com
PASADENA, Calif.–(BUSINESS WIRE)–RealDefense LLC, a company that specializes in privacy, security, and productivity software and services, has completed its roll-up of SUPERAntiSpyware from Support.com for an undisclosed amount. This transaction marks the fifth consumer software brand acquisition for RealDefense since…
Senhasegura Wins 2022 CyberSecured Award for Best Privileged Access Management (PAM) Solution
SÃO PAULO & SAN FRANCISCO–(BUSINESS WIRE)–Senhasegura, a leading Privileged Access Management (PAM) solution provider, today announced it was named the winner of the 2022 CyberSecured Award for Best Privileged Access Management (PAM). Now in its third year, the CyberSecured Awards…
Verimatrix Secure Delivery Platform Marks Its First Year with Billions of Video Viewership Licenses Served
AIX-EN-PROVENCE, France & SAN DIEGO–(BUSINESS WIRE)–Regulatory News: Verimatrix, (Euronext Paris: VMX) (Paris:VMX), the leader in powering the modern connected world with people-centered security, today announced its Verimatrix Secure Delivery Platform quickly reached billions of delivered video viewership licenses in less…
CFM and NXTsoft Announce Strategic Combination
TEMPE, Ariz. & BIRMINGHAM, Ala.–(BUSINESS WIRE)–OceanSound Partners, a growth-oriented private equity firm, today announced that its portfolio company, CFM, has merged with NXTsoft. The combination creates the leading provider of API connectivity, workflow automation, and data analytics software for financial…
Predictions 2023, Part 1: What will the new year bring for the InfoSec Community?
By Diana-Lynn Contesti, CISSP-ISSAP, ISSMP, CSSLP, SSCP In recent years, we have seen the threat landscape become increasingly complex as threat actors use sophisticated techniques to exploit vulnerabilities of weak passwords, missing patches and antiquated software, thus gaining access to…
12 ways to improve your website security
The content of this post is solely the responsibility of the author. AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article. In today's digital age, a business website is…
AI and Cybersecurity: Some observational implications of the intersection between the two
There is a possibility that artificial intelligence (AI) will have a significant influence, in either a good or bad direction, on cybersecurity. On the plus side, artificial intelligence (AI) can be used to automate and improve many parts of cybersecurity.…
Ermetic extends its CNAPP with cloud workload protection capabilities
Ermetic has extended its Cloud Native Application Protection Platform (CNAPP) with cloud workload protection capabilities that enable customers to detect, prevent and remediate security risks in virtual machines, containers and serverless functions. Using context that spans infrastructure configurations, network, access…
Cloud Range for Critical Infrastructure improves operational efficiency of security teams
Cloud Range has introduced Cloud Range for Critical Infrastructure—the live-fire simulation training specifically designed to proactively train and prepare incident responders (IR) and security operations (SOC) teams in operational technology (OT) and information technology (IT) environments to defend against cyber…
Bitdefender Recognized Under XDR, EDR and EPP Categories in 2022 Gartner® Hype Cycle™ for Endpoint Security Report
BUCHAREST, Romania & SANTA CLARA, Calif.–(BUSINESS WIRE)–Bitdefender, a global cybersecurity leader, is pleased to announce that it was recognized in the December 2022 Gartner® Hype Cycle™ for Endpoint Security¹ report across multiple categories. The report tracks the innovations that aid…
Why your data is more valuable than you may realize
The data trail you leave behind whenever you’re online is bigger – and more revealing – than you may think The post Why your data is more valuable than you may realize appeared first on WeLiveSecurity This article has been…
Google slays thousands of fake news vids posted by pro-China group Dragonbridge
If you yell ‘death to America’ and no one watches the video, does it make a sound? Google’s Threat Analysis Group (TAG) has burned more than 50,000 spammy fake news stories and other content posted by the pro-China ‘Dragonbridge’ gang.……