News

  • New Yorker Gets Four Years for $9m COVID Fraud Scheme

    PRIVACY PRIVACY Woman recruited multiple co-conspirators to help her Read More

    Read More

  • How to survive below the cybersecurity poverty line

    PRIVACY PRIVACY The security poverty line broadly defines a divide between the organizations that have the means and resources to achieve and maintain mature security postures to protect data, and those that do not. It was first coined by cybersecurity expert Wendy Nather in 2011, and the concept is just as relevant today as it…

    Read More

  • Economic headwinds could deepen the cybersecurity skills shortage

    PRIVACY PRIVACY According to the most recent research report from ESG and the Information System Security Association International (ISSA), 57% of organizations claim that they’ve been impacted by the global cybersecurity skills shortage, while 44% of organizations believe the skills shortage has gotten worse over the past few years. The result? Increasing workloads on existing cybersecurity…

    Read More

  • Five Data Wipers Attack Ukrainian News Agency

    PRIVACY PRIVACY Russia’s Sandworm group suspected of destructive attack Read More

    Read More

  • Friday Squid Blogging: Squid-Inspired Hydrogel

    PRIVACY PRIVACY Scientists have created a hydrogel “using squid mantle and creative chemistry.” As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered. Read my blog posting guidelines here. Read More

    Read More

  • Kevin Mitnick Hacked California Law in 1983

    PRIVACY PRIVACY Early in his career, Kevin Mitnick successfully hacked California law. He told me the story when he heard about my new book, which he partially recounts his 2012 book, Ghost in the Wires. The setup is that he just discovered that there’s warrant for his arrest by the California Youth Authority, and he’s…

    Read More

  • Multiple Vulnerabilities Found In Healthcare Software OpenEMR

    PRIVACY PRIVACY Two of these vulnerabilities combined could lead to unauthenticated remote code execution Read More

    Read More

  • Black Basta Deploys PlugX Malware in USB Devices With New Technique

    PRIVACY PRIVACY The variant is “wormable” and can infect USB devices to hide itself from the Windows OS Read More

    Read More

  • New ‘Pig Butchering’ Scam in West Africa Impersonates US Financial Advisors

    PRIVACY PRIVACY DomainTools said most of these attacks exploited professional network services such as LinkedIn Read More

    Read More

  • Hackers abuse legitimate remote monitoring and management tools in attacks

    PRIVACY PRIVACY Security researchers warn that an increasing number of attackers are using legitimate remote monitoring and management (RMM) tools in their attacks to achieve remote access and control over systems. These tools are commonly used by managed service providers (MSPs) and IT help desks so their presence on an organization’s network and systems might…

    Read More

News, Advisories and much more

Exit mobile version