-
Australia fronts International Counter Ransomware Taskforce
PRIVACY PRIVACY The International Counter Ransomware Taskforce (ICRTF), envisioned by the International Counter Ransomware Initiative (CRI), kicked off its operations on Monday with Australia as its inaugural chair and coordinator. The CRI was first brought together in October 2021 with a virtual meeting of 30 countries, facilitated by the US White House National Security Council. In…
-
What Should You Do if Your Identity Has Been Stolen?
PRIVACY PRIVACY It’s been like this from the start—wherever people shop, do business, or simply gather together, you’ll find thieves in the mix, ready to take advantage. And that’s truer today when it comes to life online as cybercriminals use the internet to steal financial or personal data for their personal gain—otherwise known as identity…
-
The PayPal Breach – Who Was Affected and How You Can Protect Yourself
PRIVACY PRIVACY PayPal recently notified thousands of its customers that their accounts were breached by hackers, leaving their Social Security Numbers and other key pieces of personal information exposed as a result. Sources report, that the attack involved “credential stuffing,” where hackers gather lists of usernames and passwords sourced from the dark web or from…
-
Nvidia targets insider attacks with digital fingerprinting technology
PRIVACY PRIVACY Nvidia today announced that a digital lab playground for its latest security offering is now available, letting users try out an AI-powered system designed to monitor individual user accounts for potentially hazardous behavior. The idea, according to the company, is to leverage the large amounts of data that many organizations compile anyway about…
-
Attackers exploiting critical flaw in many Zoho ManageEngine products
PRIVACY PRIVACY Users of on-premises deployments of Zoho ManageEngine products should make sure they have patches applied for a critical remote code execution vulnerability that attackers have now started exploiting in the wild. Technical details about the flaw along with a proof-of-concept exploit was released late last week, which will allow more attackers to add…
-
After data breach put their lives at risk, US releases 3000 immigrants seeking asylum
PRIVACY PRIVACY Imagine you’re an immigrant, who has fled your home country for the United States due to fear of being persecuted and tortured. What you definitely do not want is the agency handling your asylum request being careless with your personal information – and potentially putting your life and that of loved ones at…
-
US Supreme Court leak investigation highlights weak and ineffective risk management strategy
PRIVACY PRIVACY The Supreme Court of the United States (SCOTUS) has announced that its investigation to find the insider who leaked a draft opinion of the Dobbs v. Jackson Women’s Health Org. decision to media outlet Politico has come up empty. In a nutshell, the court’s insider risk management program, designed to protect the information…
-
Hackers Deploy Open-Source Tool Sliver C2, Replacing Cobalt Strike, Metasploit
PRIVACY PRIVACY Sliver is gaining popularity due to its modular capabilities and cross-platform support Read More
-
Two Vulnerabilities Found in Galaxy App Store
PRIVACY PRIVACY Both issues reportedly affected only Samsung devices running Android 12 and below Read More
-
Most Federal Agencies Ignored GAO’s Cybersecurity Recommendations
PRIVACY PRIVACY Out of the 335 public recommendations issued since 2010, 190 still needed to be implemented Read More