CIS-CAT Pro is Now Even Better! Here’s How We’ve Improved It
We're retiring CIS-CAT Pro Dashboard v2.x and releasing CIS-CAT Pro Dashboard v3.x, which will embed CIS-CAT Pro Assessor v4 Service.[…] Read More
Multiple Vulnerabilities in Aruba EdgeConnect Enterprise Orchestrator Could Allow for Remote Code Execution
Multiple vulnerabilities have been discovered in Aruba EdgeConnect Enterprise Orchestrator’s Web-Based Management Interface, the most severe of which could allow for remote code execution. Aruba...
Kolide, endpoint security for teams that want to meet SOC 2 compliance goals without sacrificing privacy
Graham Cluley Security News is sponsored this week by the folks at Kolide. Thanks to the great team there for their support! In 2021, our...
Stories from the SOC: Feeling so foolish – SocGholish drive by compromise
Executive summary: SocGholish, also known as FakeUpdate, is a JavaScript framework leveraged in social engineering drive by compromises that has been a thorn in cybersecurity...
Spanish Police Bust Region’s “Biggest Narco Bank”
Underground organization said to have laundered €300m annually Read More
Top skill-building resources and advice for CISOs
The role of the CISO has evolved, and so have the responsibilities. Some believe a CISO must have technical knowledge and experience as a cybersecurity...
Hackney Council Ransomware Attack Cost £12m+
Local government's travails highlight devastating impact of breaches Read More
Global Cops Arrest Dozens Linked to Financial Crime Gang
Black Axe syndicate responsible for multimillion-dollar losses Read More
True Security Requires a Holistic Approach
In the eyes of hackers, scammers, and thieves, your online privacy and identity look like a giant jigsaw puzzle. One that they don’t need every...
ZDI-22-1440: Siemens Simcenter Femap JT File Parsing Uninitialized Pointer Remote Code Execution Vulnerability
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Siemens Simcenter Femap. User interaction is required to exploit this vulnerability in...