Iranian APT group uses previously undocumented Trojan for destructive access to organizations
Researchers have come across a previously undocumented Trojan used by an APT group of Iranian origin that has been targeting organizations in Israel but also...
DHS Creates Cyber Safety Review Board
DHS Creates Cyber Safety Review Board The United States Department of Homeland Security has established a Cyber Safety Review Board (CSRB) to investigate “significant cyber...
BlackCat ransomware – what you need to know
BlackCat (also known as ALPHV) is a relatively new ransomware-as-a-service operation, which has been aggressively recruiting affiliates from other ransomware groups and targeting organisations worldwide....
#Enigma2022: Contextual Security Should Supplement Machine Learning for Malware Detection
#Enigma2022: Contextual Security Should Supplement Machine Learning for Malware Detection Malware continues to be one of the most effective attack vectors in use today, and...
KP Snacks Hit by Cyber-attack
KP Snacks Hit by Cyber-attack Brits could be facing a snack shortage following a cyber-attack on 169-year-old food producer KP Snacks. The German-owned maker of KP...
CVE-2022-20699, CVE-2022-20700, CVE-2022-20708: Critical Flaws in Cisco Small Business RV Series Routers
Cisco patches 15 flaws in Cisco Small Business RV Series Routers, including three with critical 10.0 CVSSv3 scores. Update February 4: Cisco has updated their...
Zero trust with zero passwords – free guide explains what you need to know
Graham Cluley Security News is sponsored this week by the folks at HYPR. Thanks to the great team there for their support! A new guide...
Interview with the Head of the NSA’s Research Directorate
MIT Technology Review published an interview with Gil Herrera, the new head of the NSA’s Research Directorate. There’s a lot of talk about quantum computing,...
Smashing Security podcast #260: New hire mystery, hacktivist ransomware, and digi-dating
Who's that new guy working at your company, and why don't you recognise him from the interview? How are hacktivists raising the heat in Belarus?...
Using KPIs to generate results in Cybersecurity
Gaining investment from business leaders to create a mature cybersecurity program and fund initiatives is an imperative for success in enterprise risk mitigation. All too...