When Misconfigurations Open the Door to Russian Attackers
Organizations need to address security misconfigurations in their environments so that Russian state-sponsored threat actors don't get to them first. Read More
Undetectable Backdoors in Machine-Learning Models
New paper: “Planting Undetectable Backdoors in Machine Learning Models: Abstract: Given the computational cost and technical expertise required to train machine learning models, users may...
Oracle Critical Patch Update Advisory – April 2022
Post Content Read More
Community Defense Against Ransomware
This virtual Cybersecurity Modernization Summit explored the ongoing challenge of cybersecurity in the state and local government and higher education communities. Read More
US Officials Increase Warnings About Russian Cyber-Attacks
The energy and finance sectors are likely to be targeted by Russian cyber-criminals Read More
Funky Pigeon Suspends Orders Following Cyber-Attack
The retailer is currently investigating whether personal data was accessed in the attack Read More
[R1] Tenable.sc 5.21.0 Fixes Fix Multiple Third-Party Vulnerabilities
Tenable.sc leverages third-party software to help provide underlying functionality. Several of the third-party components were found to contain vulnerabilities, and updated versions have been made...
Funky Pigeon stalls orders after hackers breach its systems
Online greeting cards business Funky Pigeon was forced to close its doors temporarily last week after a "cybersecurity incident." Visitors to the company's website were...
For cutting-edge web application and API protection – Trust Indusface WAAP
Graham Cluley Security News is sponsored this week by the folks at Indusface. Thanks to the great team there for their support! With APIs grown...
LinkedIn Becomes the Most Impersonated Brand for Phishing Attacks
The research found that phishing attempts impersonating LinkedIn made up 52% of attacks globally in Q1 2022 Read More