Hacking Alexa through Alexa’s Speech
An Alexa can respond to voice commands it issues. This can be exploited: The attack works by using the device’s speaker to issue voice commands....
Researchers find new way to neutralize side-channel memory attacks
Researchers at the Massachusetts Institute of Technology have discovered a way to foil memory-timing side-channel attacks that's more efficient than other methods. The attacks can...
ISO 27002 2013 to 2022 mapping
On February 15th, the International Organization for Standardization (ISO), published the latest update to “ISO/IEC 27002 Information security, cybersecurity and privacy protection — Information security...
Musk Warns Starlink Could Attract Russian Bombs
Satellite comms system is helping Ukraine stay online Read More
Gartner: SSE is SASE minus the SD-WAN
Security service edge (SSE) bundles a cloud access security broker, secure web gateway and ZTNA, according to Gartner. Read More
Counterfeit and Pirated Imports Surge During Pandemic
Europol report warns of risk to economy and citizens’ health Read More
Ukraine Set to Join NATO Cyber Hub
Members voted unanimously to admit Eastern European nation Read More
How attackers sidestep the cyber kill chain
The idea of the cyber kill chain was first developed by Lockheed Martin more than a decade ago. The basic idea is that attackers perform...
CISOs are still chiefs in name only
Look around the CISO community, and you’ll find signs of burnout everywhere. Where CISOs aren’t just quitting, you’ll find increasing tension between them and their...
Conti ransomware, which leaked ransomware victims’ data, has its own data leaked
Oh how embarrassing for the criminal gang who extorted millions from businesses by threatening to leak their data, that someone leaked some 160,000 messages between...