-
Iranian Hackers Launch Renewed Attack on Albania
PRIVACY PRIVACY Prime Minister warns of disruption at border crossings Read More
-
CNAPP buyers guide: Top tools compared
PRIVACY PRIVACY Cloud security continues to be a vexing situation, and the tool set continues to become more complex, riddled with acronyms representing possible solutions. Now there’s another: the cloud native application protection platform, or CNAPP. This tool combines the coverage of four separate products: A cloud infrastructure entitlements manager (CIEM) that manages overall access…
-
Researchers Warn of 674% Surge in Deadbolt Ransomware
PRIVACY PRIVACY Malware continues to infect QNAP devices Read More
-
Hands-on cyberattacks jump 50%, CrowdStrike reports
PRIVACY PRIVACY Enterprises monitored by CrowdStrike’s Falcon OverWatch threat hunters faced 77,000 attempts of hands-on, interactive intrusions, or approximately one potential intrusion every seven minutes, between July 1, 2021, and June 30, 2022—a 50% year-over-year increase, according to a new report from the cybersecurity company. Breakout time, or the time an adversary takes to move…
-
US Treasury Sanctions Iranian Minister Over Hacking of Govt and Allies
PRIVACY PRIVACY Iran would have directed several networks of cyber threat actors in support of its political goals Read More
-
Navigating Today’s Security Challenges at InfoSec World 2022
PRIVACY PRIVACY CIS is excited to sponsor and attend InfoSec World 2022 at Disney’s Coronado Springs Resort in Lake Buena Vista, Florida. Read More
-
High Severity Vulnerabilities Found in HP Enterprise Devices
PRIVACY PRIVACY The flaws affect HP EliteBook devices and have CVSS scores between 7.5 and 8.2 Read More
-
Oxeye Discovers Several High Severity IDOR Vulnerabilities in Harbor
PRIVACY PRIVACY The flaws were discovered despite Harbor having implemented RBAC on most HTTP endpoints Read More
-
New Linux Cryptomining Malware
PRIVACY PRIVACY It’s pretty nasty: The malware was dubbed “Shikitega” for its extensive use of the popular Shikata Ga Nai polymorphic encoder, which allows the malware to “mutate” its code to avoid detection. Shikitega alters its code each time it runs through one of several decoding loops that AT&T said each deliver multiple attacks, beginning…
-
How to unite security and compliance in 5 simple ways
PRIVACY PRIVACY This blog was written by an independent guest blogger. We have entered the era of data compliance laws, but regulations have not quite caught up to the level of risk that most organizations are exposed to. Uniting security and compliance is crucial to maintaining regulation standards and ensuring a secure environment for your…