News

  • Cybersecurity Snapshot: 6 Things That Matter Right Now

    PRIVACY PRIVACY Topics that are top of mind for the week ending Sept. 30 | Are you ready for the quantum threat? | Tips for protecting critical infrastructure from cyberattacks | How to prevent MFA fatigue attacks | “FiGHT” to secure 5G networks | And much more! 1. MFA fatigue in the spotlight The social…

    Read More

  • How analyzing employee behavior can improve your cybersecurity posture

    PRIVACY PRIVACY This blog was written by an independent guest blogger. Despite the ongoing rise in social engineering attacks, the idea that cybersecurity is only about technology manifests within most of our minds. Organizations often neglect human behavior’s impact on their cybersecurity postures. Instead, they spend lavishly on endpoint security tools, threat hunting programs, and…

    Read More

  • Manufacturers Failing to Address Cybersecurity Vulnerabilities Liable Under New European Rules

    PRIVACY PRIVACY The liability rules allow for compensation for damage when manufacturers fail to address cybersecurity vulnerabilities Read More

    Read More

  • Fake CISO Profiles on LinkedIn Target Fortune 500s

    PRIVACY PRIVACY Someone has recently created a large number of fake LinkedIn profiles for Chief Information Security Officer (CISO) roles at some of the world’s largest corporations. It’s not clear who’s behind this network of fake CISOs or what their intentions may be. But the fabricated LinkedIn identities are confusing search engine results for CISO…

    Read More

  • Malware builder uses fresh tactics to hit victims with Agent Tesla RAT

    PRIVACY PRIVACY A recently discovered malware builder sold on the dark web, Quantum Builder, is being used in a new campaign featuring fresh tactics to deliver the Agent Tesla .NET-based keylogger and remote access trojan (RAT), according to an alert issued by the ThreatLabz research unit of cybersecurity company Zscaler. To read this article in…

    Read More

  • Most hackers need 5 hours or less to break into enterprise environments

    PRIVACY PRIVACY Around 40% of ethical hackers recently surveyed by the SANS Institute said they can break into most environments they test, if not all. Nearly 60% said they need five hours or less to break into a corporate environment once they identify a weakness. The SANS ethical hacking survey, done in partnership with security…

    Read More

  • IT admin admits sabotaging ex-employer’s network in bid for higher salary

    PRIVACY PRIVACY A 40-year-old man could face up to 10 years in prison, after admitting in a US District Court to sabotaging his former employer’s computer systems. Read more in my article on the Tripwire State of Security blog. Read More

    Read More

  • Researchers Discover Chaos, a Golang Multipurpose Botnet

    PRIVACY PRIVACY The tool was written in Chinese and seemed China-based due to its C2 infrastructure Read More

    Read More

  • Government, Union-Themed Lures Used to Deliver Cobalt Strike Payloads

    PRIVACY PRIVACY Cisco Talos discovered the malicious campaign in August 2022 Read More

    Read More

  • LeakBase: India Swachhata Platform Breached, 16 Million User PII Records Exposed

    PRIVACY PRIVACY Data samples contain email addresses, hashed passwords and user IDs, other PII Read More

    Read More

News, Advisories and much more

Exit mobile version