-
Ready to enhance your continuous assessment efforts? Meet PlexTrac
PRIVACY PRIVACY Graham Cluley Security News is sponsored this week by the folks at PlexTrac. Thanks to the great team there for their support! If you are investing in solutions for continuous assessment and validation or breach and attack simulation, you know that managing the data and remediation efforts necessary to make real progress can…
-
Friday Squid Blogging: China’s Squid Fishing Ban Ineffective
PRIVACY PRIVACY China imposed a “pilot program banning fishing in parts of the south-west Atlantic Ocean from July to October, and parts of the eastern Pacific Ocean from September to December.” However, the conservation group Oceana analyzed the data and figured out that the Chinese weren’t fishing in those areas in those months, anyway. <…
-
Kroll Employee SIM-Swapped for Crypto Investor Data
PRIVACY PRIVACY Security consulting giant Kroll disclosed today that a SIM-swapping attack against one of its employees led to the theft of user information for multiple cryptocurrency platforms that are relying on Kroll services in their ongoing bankruptcy proceedings. And there are indications that fraudsters may already be exploiting the stolen data in phishing attacks.…
-
Hacking Food Labeling Laws
PRIVACY PRIVACY This article talks about new Mexican laws about food labeling, and the lengths to which food manufacturers are going to ensure that they are not effective. There are the typical high-pressure lobbying tactics and lawsuits. But there’s also examples of companies hacking the laws: Companies like Coca-Cola and Kraft Heinz have begun designing…
-
The SEC demands more transparency about Cybersecurity incidents in public companies
PRIVACY PRIVACY The Securities and Exchange Commission (SEC) has introduced a new rule for public companies that requires them to be more transparent about cybersecurity incidents. The new rule requires companies to disclose any material cybersecurity incidents within four business days of that determination. The disclosure should describe the material aspects of the incident, including…
-
Privacy Regulator Warns of Surge in “Text Pest” Cases
PRIVACY PRIVACY Nearly one in three young adults has had their personal information misused Read More
-
Researchers Discover Reply URL Takeover Issue in Azure
PRIVACY PRIVACY Vulnerability could be exploited to gain elevated privileges Read More
-
FBI: Barracuda Appliances Still Being Exploited By China
PRIVACY PRIVACY Feds warn that patching will not rid system of APT group Read More
-
Lazarus Group Targets Internet Infrastructure and Healthcare with ‘QuiteRAT’ Malware
PRIVACY PRIVACY QuiteRAT, the North-Korea-Backed group’s new malware, exploits a 2022 ManageEngine ServiceDesk vulnerability Read More
-
Creative QakBot Attack Tactics Challenge Security Defenses
PRIVACY PRIVACY Threat actors use unique infection chains to deploy QakBot malware Read More