#Enigma2022: Contextual Security Should Supplement Machine Learning for Malware Detection
#Enigma2022: Contextual Security Should Supplement Machine Learning for Malware Detection Malware continues to be one of the most effective attack vectors in use today, and...
KP Snacks Hit by Cyber-attack
KP Snacks Hit by Cyber-attack Brits could be facing a snack shortage following a cyber-attack on 169-year-old food producer KP Snacks. The German-owned maker of KP...
CVE-2022-20699, CVE-2022-20700, CVE-2022-20708: Critical Flaws in Cisco Small Business RV Series Routers
Cisco patches 15 flaws in Cisco Small Business RV Series Routers, including three with critical 10.0 CVSSv3 scores. Update February 4: Cisco has updated their...
Zero trust with zero passwords – free guide explains what you need to know
Graham Cluley Security News is sponsored this week by the folks at HYPR. Thanks to the great team there for their support! A new guide...
Interview with the Head of the NSA’s Research Directorate
MIT Technology Review published an interview with Gil Herrera, the new head of the NSA’s Research Directorate. There’s a lot of talk about quantum computing,...
Smashing Security podcast #260: New hire mystery, hacktivist ransomware, and digi-dating
Who's that new guy working at your company, and why don't you recognise him from the interview? How are hacktivists raising the heat in Belarus?...
Using KPIs to generate results in Cybersecurity
Gaining investment from business leaders to create a mature cybersecurity program and fund initiatives is an imperative for success in enterprise risk mitigation. All too...
Crunch! Ransomware hits KP Nuts, Hula Hoops, and McCoys crisps
The IT systems of KP Snacks have been hit by ransomware. And it might well impact the British public's waistlines as well as the company's...
Growing Number of Phish Kits Bypass MFA
Growing Number of Phish Kits Bypass MFA Phishing kits designed to circumvent multi-factor authentication (MFA) by stealing session cookies are increasingly popular on the cybercrime...
Apple AirTag and other tagging devices add to CISO worries
We tag content, devices and our belongings. Tagging is ubiquitous today, in early 2022, but it wasn’t always the case. Stepping back into history, the...