News

  • Glut of Fake LinkedIn Profiles Pits HR Against the Bots

    PRIVACY PRIVACY A recent proliferation of phony executive profiles on LinkedIn is creating something of an identity crisis for the business networking site, and for companies that rely on it to hire and screen prospective employees. The fabricated LinkedIn identities — which pair AI-generated profile photos with text lifted from legitimate accounts — are creating…

    Read More

  • CIS Benchmarks October 2022 Update

    PRIVACY PRIVACY The CIS Benchmarks development team has been hard at work preparing several brand new Benchmarks and updates for October 2022. Read More

    Read More

  • North Korea’s Lazarus group uses vulnerable Dell driver to blind security solutions

    PRIVACY PRIVACY The notorious North Korean state-sponsored hacker group Lazarus has begun exploiting a known vulnerability in an OEM driver developed by Dell to evade detection by security solutions. This is a prime example of why it’s important to always keep third-party PC manufacturer software, which is often neglected, up to date, as well as…

    Read More

  • October Is Cybersecurity Awareness Month

    PRIVACY PRIVACY For the past nineteen years, October has been Cybersecurity Awareness Month here in the US, and that event that has always been part advice and part ridicule. I tend to fall on the apathy end of the spectrum; I don’t think I’ve ever mentioned it before. But the memes can be funny. Here’s…

    Read More

  • Canadian Sentenced 20 Years in US Prison For Ransomware Attacks

    PRIVACY PRIVACY Sebastien Vachon-Desjardins, 35, was also ordered to forfeit $21.5m Read More

    Read More

  • CISA Advisory Details How Hackers Targeted Defense Industrial Base Organization

    PRIVACY PRIVACY The document was jointly released by CISA with the FBI and NSA Read More

    Read More

  • Australia’s Data Breaches Continue With Telstra’s Third-Party Supplier Hacked

    PRIVACY PRIVACY The data posted on the internet by the hackers was from 2017 and reportedly “basic in nature” Read More

    Read More

  • Cybersecurity considerations for wearable tech

    PRIVACY PRIVACY This blog was written by an independent guest blogger. Ours truly is the great age of digital technology. Indeed, few of us can get through an ordinary day without engaging with some kind of digital device, whether we’re using them to communicate, research, work, bank, or even monitor our health. In many cases,…

    Read More

  • Ransomware Group Bypasses “Enormous” Range of EDR Tools

    PRIVACY PRIVACY BlackByte delivers new way to circumvent endpoint detection Read More

    Read More

  • The astronomical costs of an asset disposal program gone wrong

    PRIVACY PRIVACY Every entity should have an information technology asset disposal (ITAD) program as part of its information security process and procedure. Indeed, every time an IT asset is purchased, the eventual disposal of that asset should already be defined within an ITAD. When one doesn’t exist, data becomes exposed, compromises occur, and in many…

    Read More

News, Advisories and much more

Exit mobile version