-
Computer Repair Technicians Are Stealing Your Data
PRIVACY PRIVACY Laptop technicians routinely violate the privacy of the people whose computers they repair: Researchers at University of Guelph in Ontario, Canada, recovered logs from laptops after receiving overnight repairs from 12 commercial shops. The logs showed that technicians from six of the locations had accessed personal data and that two of those shops…
-
EU Council adopts NIS2 directive to harmonize cybersecurity across member states
PRIVACY PRIVACY The Council of the European Union (EU) has adopted a new cybersecurity directive designed to improve resilience and incident response capacities across the EU, replacing NIS, the current directive on the security of network and information systems. The new directive, NIS2, will set the baseline for cybersecurity risk management measures and reporting obligations…
-
500 million WhatsApp mobile numbers up for sale on the dark web
PRIVACY PRIVACY A database of 487 million WhatsApp users’ mobile numbers has been put up for sale on a hacking community forum. The data set contains WhatsApp user data from more than 84 countries, the post shows. The story was first reported by Cybernews. The seller of the leaked data is also offering it through the…
-
Orange Cyberdefense Unveils Its Security Navigator With OT Hacking Demos
PRIVACY PRIVACY The cybersecurity arm of Orange Business Services (OBS) organized a launch event at its Lyon campus, in France, for its latest annual threat report Read More
-
2021 NCSR: SLTTs Struggle with Supply Chain, Risk Management
PRIVACY PRIVACY SLTTs can use the 2021 NCSR’s findings to better understand their cybersecurity postures so that they can make meaningful improvements.[…] Read More
-
Belgian Police Under Fire After Major Ransomware Leak
PRIVACY PRIVACY Crime reports dating back 15 years are made public Read More
-
McAfee Personal Data Cleanup: Your Partner in Living a More Private Online Life
PRIVACY PRIVACY Do yourself a favor: Open a new browser tab and head to your search engine of choice. Type in your full name and home address. Then, see what pops up. Are the results sparking an ember of unease in the back of your brain? Whether you’re a private person online or you’re comfortable…
-
Russian Sandworm Hackers Linked to New Ransomware Blitz
PRIVACY PRIVACY Ukrainian targets are on the receiving end of RansomBoggs variant Read More
-
Here is why you should have Cobalt Strike detection in place
PRIVACY PRIVACY Google recently released a list of YARA detection rules for malicious variants of the legitimate Cobalt Strike penetration testing framework that are being used by hackers in the wild. Cobalt Strike is a commercial attack framework designed for red teams that has also been adopted by many threat actors, from APT groups to…
-
Top 7 CIAM tools
PRIVACY PRIVACY Customer identity and access management (CIAM), a subset of identity access management (IAM), is used to manage authentication and authorization of account creation and login process for public facing applications. To helps organizations compare their needs against the options in the market, CSO prepared a list with the top seven vendors in the…