News

  • Computer Repair Technicians Are Stealing Your Data

    PRIVACY PRIVACY Laptop technicians routinely violate the privacy of the people whose computers they repair: Researchers at University of Guelph in Ontario, Canada, recovered logs from laptops after receiving overnight repairs from 12 commercial shops. The logs showed that technicians from six of the locations had accessed personal data and that two of those shops…

    Read More

  • EU Council adopts NIS2 directive to harmonize cybersecurity across member states

    PRIVACY PRIVACY The Council of the European Union (EU) has adopted a new cybersecurity directive designed to improve resilience and incident response capacities across the EU, replacing NIS, the current directive on the security of network and information systems. The new directive, NIS2, will set the baseline for cybersecurity risk management measures and reporting obligations…

    Read More

  • 500 million WhatsApp mobile numbers up for sale on the dark web

    PRIVACY PRIVACY A database of 487 million WhatsApp users’ mobile numbers has been put up for sale on a hacking community forum. The data set contains WhatsApp user data from more than 84 countries, the post shows. The story was first reported by Cybernews. The seller of the leaked data is also offering it through the…

    Read More

  • Orange Cyberdefense Unveils Its Security Navigator With OT Hacking Demos

    PRIVACY PRIVACY The cybersecurity arm of Orange Business Services (OBS) organized a launch event at its Lyon campus, in France, for its latest annual threat report Read More

    Read More

  • 2021 NCSR: SLTTs Struggle with Supply Chain, Risk Management

    PRIVACY PRIVACY SLTTs can use the 2021 NCSR’s findings to better understand their cybersecurity postures so that they can make meaningful improvements.[…] Read More

    Read More

  • Belgian Police Under Fire After Major Ransomware Leak

    PRIVACY PRIVACY Crime reports dating back 15 years are made public Read More

    Read More

  • McAfee Personal Data Cleanup: Your Partner in Living a More Private Online Life

    PRIVACY PRIVACY Do yourself a favor: Open a new browser tab and head to your search engine of choice. Type in your full name and home address. Then, see what pops up.  Are the results sparking an ember of unease in the back of your brain? Whether you’re a private person online or you’re comfortable…

    Read More

  • Russian Sandworm Hackers Linked to New Ransomware Blitz

    PRIVACY PRIVACY Ukrainian targets are on the receiving end of RansomBoggs variant Read More

    Read More

  • Here is why you should have Cobalt Strike detection in place

    PRIVACY PRIVACY Google recently released a list of YARA detection rules for malicious variants of the legitimate Cobalt Strike penetration testing framework that are being used by hackers in the wild. Cobalt Strike is a commercial attack framework designed for red teams that has also been adopted by many threat actors, from APT groups to…

    Read More

  • Top 7 CIAM tools

    PRIVACY PRIVACY Customer identity and access management (CIAM), a subset of identity access management (IAM), is used to manage authentication and authorization of account creation and login process for public facing applications. To helps organizations compare their needs against the options in the market, CSO prepared a list with the top seven vendors in the…

    Read More

News, Advisories and much more

Exit mobile version