News

  • Trojanized Installers Used to Distribute Bumblebee Malware

    PRIVACY PRIVACY Secureworks’ Counter Threat Unit analyzed the findings in a report published on Thursday Read More

    Read More

  • Using the iPhone Recovery Key to Lock Owners Out of Their iPhones

    PRIVACY PRIVACY This a good example of a security feature that can sometimes harm security: Apple introduced the optional recovery key in 2020 to protect users from online hackers. Users who turn on the recovery key, a unique 28-digit code, must provide it when they want to reset their Apple ID password. iPhone thieves with…

    Read More

  • US Facebook users can now claim their share of $725 million Cambridge Analytica settlement

    PRIVACY PRIVACY Were you a US-based Facebook user between May 24 2007 and December 22 2022? If so, I’ve got some good news for you. Read more in my article on the Hot for Security blog. Read More

    Read More

  • #CYBERUK23: Five Takeaways From the NCSC Conference on the UK’s Cyber Strategy

    PRIVACY PRIVACY More collaboration, both with the private sector and international allies, is at the top of the list in the UK’s cyber playbook Read More

    Read More

  • Good Friday Agreement paved way for Northern Ireland’s emergence as a global cybersecurity hub

    PRIVACY PRIVACY The Belfast (Good Friday) Agreement played an integral role in enabling Northern Ireland’s growth as a global cybersecurity hub, according to UK government chiefs speaking at the CyberUK conference in Belfast. The Good Friday Agreement was signed on Good Friday, April 10, 1998, following three decades of conflict known as the Troubles. In…

    Read More

  • Most interesting products to see at RSA Conference 2023

    PRIVACY PRIVACY Security professionals attending this year’s RSA Conference expect to learn about new tools, platforms, and services from the 600-plus vendors exhibiting there. That’s a lot of ground to cover, so CSO has sifted through the upcoming announcements and gathered the products and services that caught our eye here. More announcements will be made…

    Read More

  • 3CX hack highlights risk of cascading software supply-chain compromises

    PRIVACY PRIVACY At the end of March, an international VoIP software company called 3CX with over 600,000 business customers suffered a serious software supply-chain compromise that resulted in both its Windows and macOS applications being poisoned with malicious code. New evidence suggests the attackers, believed to be North Korean state-sponsored hackers, gained access to the…

    Read More

  • Government Agencies Release Blueprint for Secure Smart Cities

    PRIVACY PRIVACY NCSC and CISA want to balance connectivity with resilience Read More

    Read More

  • China Developing Anti-Satellite Weapons – Report

    PRIVACY PRIVACY Pentagon leak reveals US concerns over technology push Read More

    Read More

  • The strong link between cyber threat intelligence and digital risk protection

    PRIVACY PRIVACY While indicators of compromise (IoCs) and attackers’ tactics, techniques, and processes (TTPs) remain central to threat intelligence, cyber threat intelligence (CTI) needs have grown over the past few years, driven by things like digital transformation, cloud computing, SaaS propagation, and remote worker support. In fact, these changes have led to a CTI subcategory…

    Read More

News, Advisories and much more

Exit mobile version