News

  • Akamai’s new cloud firewall capabilities aim to protect network edge

    PRIVACY PRIVACY Content delivery network (CDN) and cloud security services provider Akamai Technologies has added a network cloud firewall capability to its cloud-based DDoS platform, Akamai Prolexic. The new feature is designed to allow Akamai’s customers to define and manage their own firewall rules and access control lists (ACLs) —lists of permissions for resources in…

    Read More

  • Iranian hacking group targets Israel with improved phishing attacks

    PRIVACY PRIVACY Iranian state-sponsored threat actor, Educated Manticore, has been observed deploying an updated version of Windows backdoor PowerLess to target Israel for phishing attacks, according to a new report by Check Point. Researchers have also linked Educated Maticore hackers to APT Phosphorus, which operates in the Middle East and North America. To read this article in…

    Read More

  • Uphold Linux Systems’ Performance & Availability in Azure

    PRIVACY PRIVACY The Center for Internet Security has partnered with Microsoft Azure to test CIS Hardened Images for Linux using the Azure Monitor Agent. Read More

    Read More

  • AI to Aid Democracy

    PRIVACY PRIVACY There’s good reason to fear that A.I. systems like ChatGPT and GPT4 will harm democracy. Public debate may be overwhelmed by industrial quantities of autogenerated argument. People might fall down political rabbit holes, taken in by superficially convincing bullshit, or obsessed by folies à deux relationships with machine personalities that don’t really exist.…

    Read More

  • Application Programming Interface (API) testing for PCI DSS compliance

    PRIVACY PRIVACY This is the fourth blog in the series focused on PCI DSS, written by an AT&T Cybersecurity consultant. See the first blog relating to IAM and PCI DSS here. See the second blog on PCI DSS reporting details to ensure when contracting quarterly CDE tests here. The third blog on network and data flow…

    Read More

  • New SLP Vulnerability Could Enable Massive DDoS Attacks

    PRIVACY PRIVACY Bug has potential to facilitate 2200x amplification attacks Read More

    Read More

  • Quad Countries Prepare For Info Sharing on Critical Infrastructure

    PRIVACY PRIVACY US, Australia, India and Japan deepen cyber ties Read More

    Read More

  • Embracing zero-trust: a look at the NSA’s recommended IAM best practices for administrators

    PRIVACY PRIVACY By now, most of the industry has realized we’re seeing a shift from the legacy perimeter-based security model to an identity-centric approach to cybersecurity. If defenders haven’t realized this, malicious actors certainly have, with 80% of web application attacks utilizing stolen credentials and 40% of breaches that don’t involve insider threats and user…

    Read More

  • UK Cyber Pros Burnt Out and Overwhelmed

    PRIVACY PRIVACY Alert fatigue is a major issue, says Expel Read More

    Read More

  • #RSAC: Ransomware Poses Growing Threat to Five Eyes Nations

    PRIVACY PRIVACY Representatives of four of the five Five Eyes nations outlined the growing threat ransomware poses and approaches to thwart it Read More

    Read More

News, Advisories and much more

Exit mobile version