-
Ex-Security Chief Accuses Twitter of Cybersecurity Negligence
PRIVACY PRIVACY Peiter Zatko admitted that he “reasonably feared Twitter could suffer an Equifax-level hack” Read More
-
Hackers demand $10 million from Paris hospital after ransomware attack
PRIVACY PRIVACY Malicious hackers are demanding $10 million from a French hospital they hit with ransomware last weekend. The Hospital Center Sud Francilien (CHSF) in Corbeil-Essonnes, south-east of Paris, was struck late on Saturday night, causing major disruption to health services. Read more in my article on the Hot for Security blog. Read More
-
CISA Adds Palo Alto Networks’ PAN-OS Vulnerability to Catalog
PRIVACY PRIVACY The flaw would allow a network-based unauthenticated threat actor to perform DoS attacks Read More
-
Air-Gap Attack Exploits Gyroscope Ultrasonic Covert Channel to Leak Data
PRIVACY PRIVACY Gairoscope is a covert ultrasonic channel that does not require a microphone on the receiving side Read More
-
Software Assurance: Approaching Allowlisting for Code
PRIVACY PRIVACY While there has been significant work done on supply chain security, efforts surrounding automated software assurance continue to evolve. Read More
-
Counterfeit Android Devices Revealed to Contain Backdoor Designed to Hack WhatsApp
PRIVACY PRIVACY At least four different smartphones affected: ‘P48pro’, ‘radmi note 8’, ‘Note30u’ and ‘Mate40’ Read More
-
5 Ways to Reset Your Family’s Digital Habits this Summer
PRIVACY PRIVACY Ahhhh. Can you feel it? Summer is so close. Everything feels a little more buoyant, a little brighter. We’re in the home stretch of social distancing, a sense of normalcy is returning, and there’s a collective energy that’s ready to throw the screen door open, run outside, and pounce on summer. There’s no…
-
New IT/OT Features Help Tenable Customers Increase Visibility, Security and Control
PRIVACY PRIVACY Tenable.ot v3.14 product features increase coverage of segmented networks and give broader visibility across your operational technology (OT) environment. Now more than ever, it is essential for organizations to understand their cybersecurity baseline. From malicious outsiders and insiders to new vulnerabilities affecting multiple vendors — without effective visibility into your IT network you…
-
Signal Phone Numbers Exposed in Twilio Hack
PRIVACY PRIVACY Twilio was hacked earlier this month, and the phone numbers of 1,900 Signal users were exposed: Here’s what our users need to know: All users can rest assured that their message history, contact lists, profile information, whom they’d blocked, and other personal data remain private and secure and were not affected. For about…
-
Establishing a mobile device vulnerability management program
PRIVACY PRIVACY The introduction of mobile devices has rapidly changed the world as we know it, as these small gadgets that are intended to fit into the palm of our hands rapidly gained dominance over our day-to-day activities. Thanks to these portable devices, we now have access to an abundance of information available to us…