-
Cybersecurity Snapshot: 6 Things That Matter Right Now
PRIVACY PRIVACY Topics that are top of mind for the week ending Sept. 30 | Are you ready for the quantum threat? | Tips for protecting critical infrastructure from cyberattacks | How to prevent MFA fatigue attacks | “FiGHT” to secure 5G networks | And much more! 1. MFA fatigue in the spotlight The social…
-
How analyzing employee behavior can improve your cybersecurity posture
PRIVACY PRIVACY This blog was written by an independent guest blogger. Despite the ongoing rise in social engineering attacks, the idea that cybersecurity is only about technology manifests within most of our minds. Organizations often neglect human behavior’s impact on their cybersecurity postures. Instead, they spend lavishly on endpoint security tools, threat hunting programs, and…
-
Manufacturers Failing to Address Cybersecurity Vulnerabilities Liable Under New European Rules
PRIVACY PRIVACY The liability rules allow for compensation for damage when manufacturers fail to address cybersecurity vulnerabilities Read More
-
Fake CISO Profiles on LinkedIn Target Fortune 500s
PRIVACY PRIVACY Someone has recently created a large number of fake LinkedIn profiles for Chief Information Security Officer (CISO) roles at some of the world’s largest corporations. It’s not clear who’s behind this network of fake CISOs or what their intentions may be. But the fabricated LinkedIn identities are confusing search engine results for CISO…
-
Malware builder uses fresh tactics to hit victims with Agent Tesla RAT
PRIVACY PRIVACY A recently discovered malware builder sold on the dark web, Quantum Builder, is being used in a new campaign featuring fresh tactics to deliver the Agent Tesla .NET-based keylogger and remote access trojan (RAT), according to an alert issued by the ThreatLabz research unit of cybersecurity company Zscaler. To read this article in…
-
Most hackers need 5 hours or less to break into enterprise environments
PRIVACY PRIVACY Around 40% of ethical hackers recently surveyed by the SANS Institute said they can break into most environments they test, if not all. Nearly 60% said they need five hours or less to break into a corporate environment once they identify a weakness. The SANS ethical hacking survey, done in partnership with security…
-
IT admin admits sabotaging ex-employer’s network in bid for higher salary
PRIVACY PRIVACY A 40-year-old man could face up to 10 years in prison, after admitting in a US District Court to sabotaging his former employer’s computer systems. Read more in my article on the Tripwire State of Security blog. Read More
-
Researchers Discover Chaos, a Golang Multipurpose Botnet
PRIVACY PRIVACY The tool was written in Chinese and seemed China-based due to its C2 infrastructure Read More
-
Government, Union-Themed Lures Used to Deliver Cobalt Strike Payloads
PRIVACY PRIVACY Cisco Talos discovered the malicious campaign in August 2022 Read More
-
LeakBase: India Swachhata Platform Breached, 16 Million User PII Records Exposed
PRIVACY PRIVACY Data samples contain email addresses, hashed passwords and user IDs, other PII Read More