-
CrowdStrike expands Falcon platform with XDR for IoT assets
PRIVACY PRIVACY Cybersecurity vendor CrowdStrike has announced the release of new extended detection and response (XDR) capabilities within its Falcon platform to secure extended internet of things (XIoT) assets including IoT, Industrial IoT, OT, and medical devices. CrowdStrike Falcon Insight for IoT delivers tailored threat prevention, rapid patch management, and interoperability across XIoT assets to…
-
ZeroFox partners with Google Cloud to warn users against phishing domains
PRIVACY PRIVACY Cybersecurity provider ZeroFox has announced a partnered capability with Google Cloud to warn users of malicious URLs and fake websites in a bid to disrupt phishing campaigns. As part of the partnership, ZeroFox will automatically detect phishing domains for customers and submit verified, malicious URLs through Google Cloud’s Web Risk Submission API, disrupting…
-
Car Thieves Hacking the CAN Bus
PRIVACY PRIVACY Car thieves are injecting malicious software into a car’s network through wires in the headlights (or taillights) that fool the car into believing that the electronic key is nearby. News articles. Read More
-
Battle could be brewing over new FCC data breach reporting rules
PRIVACY PRIVACY On January 6, the United States Federal Communications Commission (FCC) launched a notice of proposed rulemaking (NPRM) to update its data breach reporting rules for telecommunications carriers. “The law requires carriers to protect sensitive consumer information but, given the increase in frequency, sophistication, and scale of data leaks, we must update our rules…
-
GitGuardian’s honeytokens in codebase to fish out DevOps intrusion
PRIVACY PRIVACY Code security provider GitGuardian has added a new honeytoken module to its platform to help customers secure their software development life cycle and software supply chains with intrusion and code leakage detection assistance. Honeytokens are code scripts containing decoy credentials, which can be placed within a customer’s development environments to lure out attackers…
-
US Scrambles to Investigate Military Intel Leak
PRIVACY PRIVACY Publication of classified docs could help Russian war effort Read More
-
KFC Owner Discloses Data Breach
PRIVACY PRIVACY Yum! Brands warns of fallout from January incident Read More
-
Why reporting an incident only makes the cybersecurity community stronger
PRIVACY PRIVACY Reporting an incident to the correct authorities or vulnerability clearinghouses can be an experience fraught with frustration. You pour time, energy, and resources into fighting an intrusion, all while keeping company officials and stakeholders up to date and preventing sensitive information from getting into the wild. Explaining what happened might seem just like…
-
Latitude Financial Refuses to Pay Ransom
PRIVACY PRIVACY Breached Aussie firm says it will only embolden extorters Read More
-
What is a Zero-Day Threat?
PRIVACY PRIVACY “Zero-day threat.” It may sound like the title of a hit film, yet it’s anything but. It’s a previously unknown vulnerability that hackers can exploit to unleash unforeseen attacks on computers, smartphones, or networks—making essentially any connected device or system potentially susceptible to attack. After all, today’s devices and code are complex and…