News

  • Bitzlato cryptocurrency exchange shut down by authorities, accused of cybercriminal links

    PRIVACY PRIVACY The Bitzlato cryptocurrency exchange has had its website seized by the authorities, after its Russian founder was charged with processing more than US $700m worth of “dirty money” on behalf of criminals. Read More

    Read More

  • Why you don’t have to fix every vulnerability

    PRIVACY PRIVACY The word “vulnerability” typically comes with a “must fix now” response. However, not all vulnerabilities should be treated equally because not all of them pose a risk. It all depends on what the data represents. In fact, some vulnerabilities are OK to deprioritize, depending on associated threats and the value of the asset…

    Read More

  • Ransomware Payments Fall by 40% in 2022

    PRIVACY PRIVACY The Chainalysis report found that victim organizations are increasingly reluctant to pay ransom demands Read More

    Read More

  • Chinese hackers targeted Iranian government entities for months: Report

    PRIVACY PRIVACY Chinese advanced persistent threat actor, Playful Taurus, targeted several Iranian government entities between July and December 2022, according to a Palo Alto Networks report.  The Chinese threat actor also known as APT15, KeChang, NICKEL, BackdoorDiplomacy, and Vixen Panda, was observed attempting to connect government domains to malware infrastructure previously associated with the APT…

    Read More

  • Security Analysis of Threema

    PRIVACY PRIVACY A group of Swiss researchers have published an impressive security analysis of Threema. We provide an extensive cryptographic analysis of Threema, a Swiss-based encrypted messaging application with more than 10 million users and 7000 corporate customers. We present seven different attacks against the protocol in three different threat models. As one example, we…

    Read More

  • Improve your AWS security posture, Step 3: Encrypt AWS data in transit and at rest

    PRIVACY PRIVACY In the first two blogs in this series, we discussed properly setting up IAM and avoiding direct internet access to AWS resources. In this blog, we’ll tackle encrypting AWS in transit and at rest. Sometimes, despite all efforts to the contrary, data can be compromised.  This can occur due to data leakage through faulty apps…

    Read More

  • Over a Third of Recent ICS Bugs Still Have No Vendor Patch

    PRIVACY PRIVACY News comes as thousands of critical infrastructure attacks are detected Read More

    Read More

  • FTX: Over $400m Was Stolen from Bankrupt Exchange

    PRIVACY PRIVACY Founder already charged with fraud and money laundering Read More

    Read More

  • Crypto-Exchange Used to Launder Ransomware Transactions Dismantled

    PRIVACY PRIVACY The US Justice Department arrested Russian national named Anatoly Legkodymov, the alleged owner of the China-based underground platform Bitzlato Read More

    Read More

  • How CISOs can manage the cybersecurity of high-level executives

    PRIVACY PRIVACY High-level executives, including board members and C-level executives, often have access to sensitive information, making them prime targets for bad actors looking to penetrate corporate defenses. Their personal devices, among other points of entry, are glaring attack vectors for cybercriminals looking to get in on the top floor. As CISOs know, cyber incidents all…

    Read More

News, Advisories and much more

Exit mobile version