News

  • CISA, NSA, ODNI Publish Software Supply Chain Guidelines For Customers

    PRIVACY PRIVACY The come after the August release of guidance for developers and the October one for suppliers Read More

    Read More

  • Shoppers Warned Stay Alert this Black Friday as Hackers Renew Efforts

    PRIVACY PRIVACY Cyber-criminals are exploiting the busy period during both purchase and delivery stages Read More

    Read More

  • Successful Hack of Time-Triggered Ethernet

    PRIVACY PRIVACY Time-triggered Ethernet (TTE) is used in spacecraft, basically to use the same hardware to process traffic with different timing and criticality. Researchers have defeated it: On Tuesday, researchers published findings that, for the first time, break TTE’s isolation guarantees. The result is PCspooF, an attack that allows a single non-critical device connected to…

    Read More

  • Instagram Credential Phishing Attacks Bypass Microsoft Email Security

    PRIVACY PRIVACY The attack bypassed both SPF and DMARC email authentication checks Read More

    Read More

  • Police force published sexual assault victims’ names and addresses on its website

    PRIVACY PRIVACY A UK police force has apologised after it published the names and addresses of victims of sexual assault on its website. Suffolk Police says that it has launched an investigation into how victims’ names, addresses, dates of birth, and details of reportedly hundreds of alleged offences were left on public view. Read more…

    Read More

  • Emerging Threat Actor DEV-0569 Expands Its Toolkit to Deliver Royal Ransomware

    PRIVACY PRIVACY As well as malvertising and phishing links, the new threat actor is now also using contact forms to deliver its payloads, found Microsoft Read More

    Read More

  • Noname Security releases Recon attack simulator

    PRIVACY PRIVACY As breaches increase and companies scramble to go from a defensive to an offensive approach, API-focused Noname Security has launched Recon, whice simulates an attacker performing reconnaissance on an organization’s domains. Recon works from a root-level domain to find other domains, shadow domains, sub-domains, APIs, vulnerabilities, and public issues that put the organization…

    Read More

  • Netflix Phishing Emails Surge 78%

    PRIVACY PRIVACY Social engineers are using Unicode techniques to bypass filters Read More

    Read More

  • Russian Duo Indicted Over E-Book Piracy

    PRIVACY PRIVACY St Petersburg couple were arrested in Argentina Read More

    Read More

  • Security Recruiter Directory

    PRIVACY PRIVACY Looking for a qualified candidate or new job? CSO’s security recruiter directory is your one-stop shop. The recruiters listed below can help you find your next chief information security officer (CISO) or VP of security and fill hard-to-hire positions in risk management, security operations, security engineering, compliance, application security, penetration testers, and computer…

    Read More

News, Advisories and much more

Exit mobile version