News

  • User Alert as Phishing Campaigns Exploit Queen’s Passing

    PRIVACY PRIVACY Experts urge the public not to fall for classic scams Read More

    Read More

  • Cybercrime Forum Admins Steal from Site Users

    PRIVACY PRIVACY Report reveals there’s no honor among thieves Read More

    Read More

  • U.S. government issues guidance for developers to secure the software supply chain: Key takeaways

    PRIVACY PRIVACY Software supply chain attacks are on the rise, as cited in the Cloud Native Computing Foundation’s (CNCF’s) Catalog of Supply Chain Compromises. Industry leaders such as the Google, Linux Foundation, OpenSSF, and public sector organizations such as NIST have provide guidance on the topic over the past year or so. The U.S. National…

    Read More

  • Russia’s cyber future connected at the waist to Soviet military industrial complex

    PRIVACY PRIVACY The Center for European Policy Analysis (CEPA) recently published a 38-page study, Russian Cyberwarfare: Unpacking the Kremlin’s Capabilities by two esteemed researchers, Irina Borogan and Andrei Soldatov. The opening premise is that Russia has not demonstrated its cyber warfare adroitness in support of its invasion of Ukraine. Whether the Russians tried, and their…

    Read More

  • Cybercrime Fears for Children as Cost-of-Living Bites

    PRIVACY PRIVACY UK parents concerned about repercussions of soaring inflation Read More

    Read More

  • ISACA: Ensuring Digital Trust Key to Digital Transformation Success

    PRIVACY PRIVACY ISACA’s State of Digital Trust 2022 report highlights increasing importance of digital trust across businesses Read More

    Read More

  • Smashing Security podcast #289: Printer peeves, health data hangups, and Twitter tussles – with Rory Cellan-Jones

    PRIVACY PRIVACY How could your inkjet printer finally help you make some money, why is it so hard to share our health data even if we want to, and what result do you want to see from the Elon Musk vs Twitter bunfight? All this and much more is discussed in the latest edition of…

    Read More

  • Excess privilege in the cloud is a universal problem, IBM says

    PRIVACY PRIVACY Excess privilege granted to cloud identities is a key component in 99% of all security tests performed by IBM’s X-Force Red penetration testing team, according to a report released Wednesday by the company. Both human users and service accounts were consistently found to have more access rights and privileges than they generally need,…

    Read More

  • Excess privilege in the cloud is a universal security problem, IBM says

    PRIVACY PRIVACY Excess privilege granted to cloud identities is a key component in 99% of all security tests performed by IBM’s X-Force Red penetration testing team, according to a report released Wednesday by the company. Both human users and service accounts were consistently found to have more access rights and privileges than they generally need,…

    Read More

  • Say Hello to Crazy Thin ‘Deep Insert’ ATM Skimmers

    PRIVACY PRIVACY A number of financial institutions in and around New York City are dealing with a rash of super-thin “deep insert” skimming devices designed to fit inside the mouth of an ATM’s card acceptance slot. The card skimmers are paired with tiny pinhole cameras that are cleverly disguised as part of the cash machine.…

    Read More

News, Advisories and much more

Exit mobile version