When Misconfigurations Open the Door to Russian Attackers
Organizations need to address security misconfigurations in their environments so that Russian state-sponsored threat actors don't get to them first. Read More
Undetectable Backdoors in Machine-Learning Models
New paper: “Planting Undetectable Backdoors in Machine Learning Models: Abstract: Given the computational cost and technical expertise required to train machine learning models, users may...
Community Defense Against Ransomware
This virtual Cybersecurity Modernization Summit explored the ongoing challenge of cybersecurity in the state and local government and higher education communities. Read More
US Officials Increase Warnings About Russian Cyber-Attacks
The energy and finance sectors are likely to be targeted by Russian cyber-criminals Read More
Funky Pigeon Suspends Orders Following Cyber-Attack
The retailer is currently investigating whether personal data was accessed in the attack Read More
Funky Pigeon stalls orders after hackers breach its systems
Online greeting cards business Funky Pigeon was forced to close its doors temporarily last week after a "cybersecurity incident." Visitors to the company's website were...
For cutting-edge web application and API protection – Trust Indusface WAAP
Graham Cluley Security News is sponsored this week by the folks at Indusface. Thanks to the great team there for their support! With APIs grown...
LinkedIn Becomes the Most Impersonated Brand for Phishing Attacks
The research found that phishing attempts impersonating LinkedIn made up 52% of attacks globally in Q1 2022 Read More
Absolute Software launches ransomware response offering to accelerate endpoint recovery
Endpoint and secure access solutions vendor Absolute Software has released a new offering to enable customers to prepare and accelerate their endpoint recovery in the...
Attack dwell times drop, ransomware TTPs evolve, China ramps up espionage activity
While significant progress is being made by global organizations in relation to threat detection and response, adversaries continue to surface, innovate, and adapt to target...