-
New Yorker Gets Four Years for $9m COVID Fraud Scheme
PRIVACY PRIVACY Woman recruited multiple co-conspirators to help her Read More
-
How to survive below the cybersecurity poverty line
PRIVACY PRIVACY The security poverty line broadly defines a divide between the organizations that have the means and resources to achieve and maintain mature security postures to protect data, and those that do not. It was first coined by cybersecurity expert Wendy Nather in 2011, and the concept is just as relevant today as it…
-
Economic headwinds could deepen the cybersecurity skills shortage
PRIVACY PRIVACY According to the most recent research report from ESG and the Information System Security Association International (ISSA), 57% of organizations claim that they’ve been impacted by the global cybersecurity skills shortage, while 44% of organizations believe the skills shortage has gotten worse over the past few years. The result? Increasing workloads on existing cybersecurity…
-
Five Data Wipers Attack Ukrainian News Agency
PRIVACY PRIVACY Russia’s Sandworm group suspected of destructive attack Read More
-
Friday Squid Blogging: Squid-Inspired Hydrogel
PRIVACY PRIVACY Scientists have created a hydrogel “using squid mantle and creative chemistry.” As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered. Read my blog posting guidelines here. Read More
-
Kevin Mitnick Hacked California Law in 1983
PRIVACY PRIVACY Early in his career, Kevin Mitnick successfully hacked California law. He told me the story when he heard about my new book, which he partially recounts his 2012 book, Ghost in the Wires. The setup is that he just discovered that there’s warrant for his arrest by the California Youth Authority, and he’s…
-
Multiple Vulnerabilities Found In Healthcare Software OpenEMR
PRIVACY PRIVACY Two of these vulnerabilities combined could lead to unauthenticated remote code execution Read More
-
Black Basta Deploys PlugX Malware in USB Devices With New Technique
PRIVACY PRIVACY The variant is “wormable” and can infect USB devices to hide itself from the Windows OS Read More
-
New ‘Pig Butchering’ Scam in West Africa Impersonates US Financial Advisors
PRIVACY PRIVACY DomainTools said most of these attacks exploited professional network services such as LinkedIn Read More
-
Hackers abuse legitimate remote monitoring and management tools in attacks
PRIVACY PRIVACY Security researchers warn that an increasing number of attackers are using legitimate remote monitoring and management (RMM) tools in their attacks to achieve remote access and control over systems. These tools are commonly used by managed service providers (MSPs) and IT help desks so their presence on an organization’s network and systems might…