-
Internet outages hit Ukraine following Russian missile strikes
PRIVACY PRIVACY Ukraine has seen internet outages this week following renewed missile attacks from Russian forces. With a combination of power cuts and DDoS attacks knocking out telecommunications systems, internet availibility suffered a 35% dip. Read more in my article on the Hot for Security blog. Read More
-
Patch your iPhone now against mystery Mail crash bug
PRIVACY PRIVACY iOS 16.0.3 has been pushed out by Apple, and my advice is that you should install it. Read More
-
Recovering Passwords by Measuring Residual Heat
PRIVACY PRIVACY Researchers have used thermal cameras and ML guessing techniques to recover passwords from measuring the residual heat left by fingers on keyboards. From the abstract: We detail the implementation of ThermoSecure and make a dataset of 1,500 thermal images of keyboards with heat traces resulting from input publicly available. Our first study shows…
-
Information overload, burnout, talent retention impacting SOC performance
PRIVACY PRIVACY While most security teams believe that security operations centers (SOCs) play a pivotal role in cybersecurity programs, several challenges are impacting SOC performance within businesses, according to a new report. Among these are information overload, worker burnout, and talent retention. The data comes from cybersecurity firm Devo following an independent survey of global…
-
12 Essential ways to improve your website security
PRIVACY PRIVACY This blog was written by an independent guest blogger. In today’s digital age, a business website is essential for success. Not only does it provide potential customers with information about your products or services, but it also allows you to connect and engage with them directly. However, simply having a website is not…
-
EU-US data sharing agreement: Is it a done deal?
PRIVACY PRIVACY With both Privacy Shield and Safe Harbor having been previously struck down by legal challenges, experts question whether US President Biden’s executive order implementing the new Trans-Atlantic Data Policy Framework will stand up to scrutiny. Read More
-
Claroty Found Hardcoded Cryptographic Keys in Siemens PLCs Using RCE
PRIVACY PRIVACY The vulnerability has been assigned a CVE – Siemens has already updated affected systems and published recommendations for mitigating the risk Read More
-
Top considerations when choosing a multi-factor authentication solution
PRIVACY PRIVACY Passwords clearly are not enough to protect networks. Any security guidance will tell you that multi-factor authentication (MFA) is a key method to keep attackers out. But what type of MFA should your firm deploy? Choosing multi-factor tokens and tools depends on your firm, your needs, and how attackers are likely to target your…
-
China’s attack motivations, tactics, and how CISOs can mitigate threats
PRIVACY PRIVACY A new report published by Booz Allen Hamilton provides detailed insight into global cyber threats posed by the People’s Republic of China (PRC). The China Cyber Threat Report outlines Beijing’s chief motivations for carrying out cyberattacks or espionage, the key tactics it employs, and provides strategies for CISOs to help their organizations to…
-
Why CISO roles require business and technology savvy
PRIVACY PRIVACY Of all the crazy postings that advertise for CISO jobs, the one asking for a CISO to code in Python was probably the most outrageous example of the disconnect about a CISO’s role, says Joe Head, CISO search director at UK-based search firm, Intaso. This was a few years ago, and one can…