-
Mass Email Extortion Campaign Claims Server Hack
PRIVACY PRIVACY Threat actors claim they’ll destroy victims’ reputation if they don’t pay Read More
-
UK Shoppers Lost £15m+ to Scammers Last Winter
PRIVACY PRIVACY Cyber experts urge consumers to improve online safety Read More
-
How Cisco keeps its APIs secure throughout the software development process
PRIVACY PRIVACY Software developers know not to reinvent the wheel. So, they lean on reusable micro-services – and their corresponding application programming interfaces (APIs) – as building blocks for application components. “Developers want to focus on the added value they can bring instead of rebuilding things that have great solutions out there already,” says Grace…
-
Ukrainian CERT Discloses New Data-Wiping Campaign
PRIVACY PRIVACY Somnia malware hijacks Telegram and VPN accounts Read More
-
Friday Squid Blogging: Squid Purse
PRIVACY PRIVACY Perfect for an evening out. As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered. Read my blog posting guidelines here. Read More
-
New Book: A Hacker’s Mind
PRIVACY PRIVACY I have a new book coming out in February. It’s about hacking. A Hacker’s Mind: How the Powerful Bend Society’s Rules, and How to Bend them Back isn’t about hacking computer systems; it’s about hacking more general economic, political, and social systems. It generalizes the term hack as a means of subverting a…
-
CISA Releases SSVC Guide to Help Companies Prioritize Vulnerabilities
PRIVACY PRIVACY Remediation efforts are prioritized based on exploitation status, safety impact and prevalence criteria Read More
-
Man Arrested in Ontario For Alleged LockBit Ransomware Involvement
PRIVACY PRIVACY Mikhail Vasiliev was apprehended in Canada and is in custody awaiting extradition to the US Read More
-
Twitter C-Level Resignations Continue As Blue Program Creates New Cyber-Risks
PRIVACY PRIVACY They left quoting concerns about the rollout of new features without an FTC consent decree Read More
-
#IRISSCON: Social Engineering Testers Warned Not to Cross Ethical and Legal Boundaries
PRIVACY PRIVACY Sharon Conheady discusses the ethical and legal dilemmas often faced by social engineering testers Read More