News

  • Internet outages hit Ukraine following Russian missile strikes

    PRIVACY PRIVACY Ukraine has seen internet outages this week following renewed missile attacks from Russian forces. With a combination of power cuts and DDoS attacks knocking out telecommunications systems, internet availibility suffered a 35% dip. Read more in my article on the Hot for Security blog. Read More

    Read More

  • Patch your iPhone now against mystery Mail crash bug

    PRIVACY PRIVACY iOS 16.0.3 has been pushed out by Apple, and my advice is that you should install it. Read More

    Read More

  • Recovering Passwords by Measuring Residual Heat

    PRIVACY PRIVACY Researchers have used thermal cameras and ML guessing techniques to recover passwords from measuring the residual heat left by fingers on keyboards. From the abstract: We detail the implementation of ThermoSecure and make a dataset of 1,500 thermal images of keyboards with heat traces resulting from input publicly available. Our first study shows…

    Read More

  • Information overload, burnout, talent retention impacting SOC performance

    PRIVACY PRIVACY While most security teams believe that security operations centers (SOCs) play a pivotal role in cybersecurity programs, several challenges are impacting SOC performance within businesses, according to a new report. Among these are information overload, worker burnout, and talent retention. The data comes from cybersecurity firm Devo following an independent survey of global…

    Read More

  • 12 Essential ways to improve your website security

    PRIVACY PRIVACY This blog was written by an independent guest blogger. In today’s digital age, a business website is essential for success. Not only does it provide potential customers with information about your products or services, but it also allows you to connect and engage with them directly. However, simply having a website is not…

    Read More

  • EU-US data sharing agreement: Is it a done deal?

    PRIVACY PRIVACY With both Privacy Shield and Safe Harbor having been previously struck down by legal challenges, experts question whether US President Biden’s executive order implementing the new Trans-Atlantic Data Policy Framework will stand up to scrutiny. Read More

    Read More

  • Claroty Found Hardcoded Cryptographic Keys in Siemens PLCs Using RCE

    PRIVACY PRIVACY The vulnerability has been assigned a CVE – Siemens has already updated affected systems and published recommendations for mitigating the risk Read More

    Read More

  • Top considerations when choosing a multi-factor authentication solution

    PRIVACY PRIVACY Passwords clearly are not enough to protect networks. Any security guidance will tell you that multi-factor authentication (MFA) is a key method to keep attackers out. But what type of MFA should your firm deploy? Choosing multi-factor tokens and tools depends on your firm, your needs, and how attackers are likely to target your…

    Read More

  • China’s attack motivations, tactics, and how CISOs can mitigate threats

    PRIVACY PRIVACY A new report published by Booz Allen Hamilton provides detailed insight into global cyber threats posed by the People’s Republic of China (PRC). The China Cyber Threat Report outlines Beijing’s chief motivations for carrying out cyberattacks or espionage, the key tactics it employs, and provides strategies for CISOs to help their organizations to…

    Read More

  • Why CISO roles require business and technology savvy

    PRIVACY PRIVACY Of all the crazy postings that advertise for CISO jobs, the one asking for a CISO to code in Python was probably the most outrageous example of the disconnect about a CISO’s role, says Joe Head, CISO search director at UK-based search firm, Intaso. This was a few years ago, and one can…

    Read More

News, Advisories and much more

Exit mobile version