-
Akamai’s new cloud firewall capabilities aim to protect network edge
PRIVACY PRIVACY Content delivery network (CDN) and cloud security services provider Akamai Technologies has added a network cloud firewall capability to its cloud-based DDoS platform, Akamai Prolexic. The new feature is designed to allow Akamai’s customers to define and manage their own firewall rules and access control lists (ACLs) —lists of permissions for resources in…
-
Iranian hacking group targets Israel with improved phishing attacks
PRIVACY PRIVACY Iranian state-sponsored threat actor, Educated Manticore, has been observed deploying an updated version of Windows backdoor PowerLess to target Israel for phishing attacks, according to a new report by Check Point. Researchers have also linked Educated Maticore hackers to APT Phosphorus, which operates in the Middle East and North America. To read this article in…
-
Uphold Linux Systems’ Performance & Availability in Azure
PRIVACY PRIVACY The Center for Internet Security has partnered with Microsoft Azure to test CIS Hardened Images for Linux using the Azure Monitor Agent. Read More
-
AI to Aid Democracy
PRIVACY PRIVACY There’s good reason to fear that A.I. systems like ChatGPT and GPT4 will harm democracy. Public debate may be overwhelmed by industrial quantities of autogenerated argument. People might fall down political rabbit holes, taken in by superficially convincing bullshit, or obsessed by folies à deux relationships with machine personalities that don’t really exist.…
-
Application Programming Interface (API) testing for PCI DSS compliance
PRIVACY PRIVACY This is the fourth blog in the series focused on PCI DSS, written by an AT&T Cybersecurity consultant. See the first blog relating to IAM and PCI DSS here. See the second blog on PCI DSS reporting details to ensure when contracting quarterly CDE tests here. The third blog on network and data flow…
-
New SLP Vulnerability Could Enable Massive DDoS Attacks
PRIVACY PRIVACY Bug has potential to facilitate 2200x amplification attacks Read More
-
Quad Countries Prepare For Info Sharing on Critical Infrastructure
PRIVACY PRIVACY US, Australia, India and Japan deepen cyber ties Read More
-
Embracing zero-trust: a look at the NSA’s recommended IAM best practices for administrators
PRIVACY PRIVACY By now, most of the industry has realized we’re seeing a shift from the legacy perimeter-based security model to an identity-centric approach to cybersecurity. If defenders haven’t realized this, malicious actors certainly have, with 80% of web application attacks utilizing stolen credentials and 40% of breaches that don’t involve insider threats and user…
-
UK Cyber Pros Burnt Out and Overwhelmed
PRIVACY PRIVACY Alert fatigue is a major issue, says Expel Read More
-
#RSAC: Ransomware Poses Growing Threat to Five Eyes Nations
PRIVACY PRIVACY Representatives of four of the five Five Eyes nations outlined the growing threat ransomware poses and approaches to thwart it Read More