News

  • CrowdStrike expands Falcon platform with XDR for IoT assets

    PRIVACY PRIVACY Cybersecurity vendor CrowdStrike has announced the release of new extended detection and response (XDR) capabilities within its Falcon platform to secure extended internet of things (XIoT) assets including IoT, Industrial IoT, OT, and medical devices. CrowdStrike Falcon Insight for IoT delivers tailored threat prevention, rapid patch management, and interoperability across XIoT assets to…

    Read More

  • ZeroFox partners with Google Cloud to warn users against phishing domains

    PRIVACY PRIVACY Cybersecurity provider ZeroFox has announced a partnered capability with Google Cloud to warn users of malicious URLs and fake websites in a bid to disrupt phishing campaigns. As part of the partnership, ZeroFox will automatically detect phishing domains for customers and submit verified, malicious URLs through Google Cloud’s Web Risk Submission API, disrupting…

    Read More

  • Car Thieves Hacking the CAN Bus

    PRIVACY PRIVACY Car thieves are injecting malicious software into a car’s network through wires in the headlights (or taillights) that fool the car into believing that the electronic key is nearby. News articles. Read More

    Read More

  • Battle could be brewing over new FCC data breach reporting rules

    PRIVACY PRIVACY On January 6, the United States Federal Communications Commission (FCC) launched a notice of proposed rulemaking (NPRM) to update its data breach reporting rules for telecommunications carriers. “The law requires carriers to protect sensitive consumer information but, given the increase in frequency, sophistication, and scale of data leaks, we must update our rules…

    Read More

  • GitGuardian’s honeytokens in codebase to fish out DevOps intrusion

    PRIVACY PRIVACY Code security provider GitGuardian has added a new honeytoken module to its platform to help customers secure their software development life cycle and software supply chains with intrusion and code leakage detection assistance. Honeytokens are code scripts containing decoy credentials, which can be placed within a customer’s development environments to lure out attackers…

    Read More

  • US Scrambles to Investigate Military Intel Leak

    PRIVACY PRIVACY Publication of classified docs could help Russian war effort Read More

    Read More

  • KFC Owner Discloses Data Breach

    PRIVACY PRIVACY Yum! Brands warns of fallout from January incident Read More

    Read More

  • Why reporting an incident only makes the cybersecurity community stronger

    PRIVACY PRIVACY Reporting an incident to the correct authorities or vulnerability clearinghouses can be an experience fraught with frustration. You pour time, energy, and resources into fighting an intrusion, all while keeping company officials and stakeholders up to date and preventing sensitive information from getting into the wild. Explaining what happened might seem just like…

    Read More

  • Latitude Financial Refuses to Pay Ransom

    PRIVACY PRIVACY Breached Aussie firm says it will only embolden extorters Read More

    Read More

  • What is a Zero-Day Threat?

    PRIVACY PRIVACY “Zero-day threat.” It may sound like the title of a hit film, yet it’s anything but.   It’s a previously unknown vulnerability that hackers can exploit to unleash unforeseen attacks on computers, smartphones, or networks—making essentially any connected device or system potentially susceptible to attack. After all, today’s devices and code are complex and…

    Read More

News, Advisories and much more

Exit mobile version