-
Bitzlato cryptocurrency exchange shut down by authorities, accused of cybercriminal links
PRIVACY PRIVACY The Bitzlato cryptocurrency exchange has had its website seized by the authorities, after its Russian founder was charged with processing more than US $700m worth of “dirty money” on behalf of criminals. Read More
-
Why you don’t have to fix every vulnerability
PRIVACY PRIVACY The word “vulnerability” typically comes with a “must fix now” response. However, not all vulnerabilities should be treated equally because not all of them pose a risk. It all depends on what the data represents. In fact, some vulnerabilities are OK to deprioritize, depending on associated threats and the value of the asset…
-
Ransomware Payments Fall by 40% in 2022
PRIVACY PRIVACY The Chainalysis report found that victim organizations are increasingly reluctant to pay ransom demands Read More
-
Chinese hackers targeted Iranian government entities for months: Report
PRIVACY PRIVACY Chinese advanced persistent threat actor, Playful Taurus, targeted several Iranian government entities between July and December 2022, according to a Palo Alto Networks report. The Chinese threat actor also known as APT15, KeChang, NICKEL, BackdoorDiplomacy, and Vixen Panda, was observed attempting to connect government domains to malware infrastructure previously associated with the APT…
-
Security Analysis of Threema
PRIVACY PRIVACY A group of Swiss researchers have published an impressive security analysis of Threema. We provide an extensive cryptographic analysis of Threema, a Swiss-based encrypted messaging application with more than 10 million users and 7000 corporate customers. We present seven different attacks against the protocol in three different threat models. As one example, we…
-
Improve your AWS security posture, Step 3: Encrypt AWS data in transit and at rest
PRIVACY PRIVACY In the first two blogs in this series, we discussed properly setting up IAM and avoiding direct internet access to AWS resources. In this blog, we’ll tackle encrypting AWS in transit and at rest. Sometimes, despite all efforts to the contrary, data can be compromised. This can occur due to data leakage through faulty apps…
-
Over a Third of Recent ICS Bugs Still Have No Vendor Patch
PRIVACY PRIVACY News comes as thousands of critical infrastructure attacks are detected Read More
-
FTX: Over $400m Was Stolen from Bankrupt Exchange
PRIVACY PRIVACY Founder already charged with fraud and money laundering Read More
-
Crypto-Exchange Used to Launder Ransomware Transactions Dismantled
PRIVACY PRIVACY The US Justice Department arrested Russian national named Anatoly Legkodymov, the alleged owner of the China-based underground platform Bitzlato Read More
-
How CISOs can manage the cybersecurity of high-level executives
PRIVACY PRIVACY High-level executives, including board members and C-level executives, often have access to sensitive information, making them prime targets for bad actors looking to penetrate corporate defenses. Their personal devices, among other points of entry, are glaring attack vectors for cybercriminals looking to get in on the top floor. As CISOs know, cyber incidents all…