CVE-2022-20699, CVE-2022-20700, CVE-2022-20708: Critical Flaws in Cisco Small Business RV Series Routers
Cisco patches 15 flaws in Cisco Small Business RV Series Routers, including three with critical 10.0 CVSSv3 scores. Update February 4: Cisco has updated their...
Zero trust with zero passwords – free guide explains what you need to know
Graham Cluley Security News is sponsored this week by the folks at HYPR. Thanks to the great team there for their support! A new guide...
Interview with the Head of the NSA’s Research Directorate
MIT Technology Review published an interview with Gil Herrera, the new head of the NSA’s Research Directorate. There’s a lot of talk about quantum computing,...
Smashing Security podcast #260: New hire mystery, hacktivist ransomware, and digi-dating
Who's that new guy working at your company, and why don't you recognise him from the interview? How are hacktivists raising the heat in Belarus?...
Using KPIs to generate results in Cybersecurity
Gaining investment from business leaders to create a mature cybersecurity program and fund initiatives is an imperative for success in enterprise risk mitigation. All too...
Crunch! Ransomware hits KP Nuts, Hula Hoops, and McCoys crisps
The IT systems of KP Snacks have been hit by ransomware. And it might well impact the British public's waistlines as well as the company's...
Growing Number of Phish Kits Bypass MFA
Growing Number of Phish Kits Bypass MFA Phishing kits designed to circumvent multi-factor authentication (MFA) by stealing session cookies are increasingly popular on the cybercrime...
Target releases web skimming detection tool Merry Maker as open source
Web skimming has been a major scourge for online shops over the past several years with attacks ranging from simple script injections into payment forms...
Why buy now, pay later is the next big fraud risk for retailers
Retailers are offering customers more buy now, pay later (BNPL) finance purchasing options to drive sales across a wide range of products. Shoppers can get...
Apple AirTag and other tagging devices add to CISO worries
We tag content, devices and our belongings. Tagging is ubiquitous today, in early 2022, but it wasn’t always the case. Stepping back into history, the...