News

  • Google updates Chronicle with enhanced threat detection

    PRIVACY PRIVACY Google Cloud Wednesday announced the general availability of what it calls “curated detection” for its Chronicle security analysis platform. The new detection feature leverages the threat intelligence that Google gains from protecting its own user base into an automated detection service that covers everything from ransomware, infostealers and data theft to simple misconfigured…

    Read More

  • Identity Scams Soar to Make 2021 a Record Year

    PRIVACY PRIVACY Non-profit says Google Voice scams were the most reported threat Read More

    Read More

  • Zoom Exploit on MacOS

    PRIVACY PRIVACY This vulnerability was reported to Zoom last December: The exploit works by targeting the installer for the Zoom application, which needs to run with special user permissions in order to install or remove the main Zoom application from a computer. Though the installer requires a user to enter their password on first adding…

    Read More

  • A pragmatic approach to risk management & resilience 

    PRIVACY PRIVACY Cybersecurity starts with the ability to recognize your cyber risk. We will explore several topics related to taking a practical approach to managing risk and achieving cyber resilience. This is a blog series with collective thoughts from Bindu Sundaresan, Director AT&T Cybersecurity, and Nick Simmons, AVP, Cybersecurity. Cybercrime has become increasingly frequent, complex, and…

    Read More

  • USBs Still a Major OT Infection Vector

    PRIVACY PRIVACY Manufacturing was most exposed to OT threats in 2021 Read More

    Read More

  • Bug Bounty Giant Slams Quality of Vendor Patching

    PRIVACY PRIVACY Zero Day Initiative says incomplete or faulty patches now commonplace Read More

    Read More

  • Ransomware safeguards for small- to medium-sized businesses

    PRIVACY PRIVACY The Institute for Security and Technology (IST) recently released a “Blueprint for Ransomware Defense.” The guide includes recommendations of defensive actions for small- and medium-sized businesses (SMBs) to protect against and respond to ransomware and other common cyberattacks. It focuses on the identify, protect, respond, and recover format that aligns with the National…

    Read More

  • What is zk-SNARK?

    PRIVACY PRIVACY Zk-SNARK, which stands for zero-knowledge succinct non-interactive argument or knowledge, is the most popular zero-knowledge protocol.  This a space of increasing importance, as zero knowledge systems are an area of active development that stand to disrupt how authentication works. While the math is intense, the overall ideas are not hard to understand.  What…

    Read More

  • “Evil PLC Attack” weaponizes PLCs to infect engineering workstations

    PRIVACY PRIVACY Most attack scenarios against industrial installations, whether in manufacturing or in critical infrastructure, focus on compromising programmable logic controllers (PLCs) to tamper with the physical processes they control and automate. One way to get malicious code running on PLCs is to first compromise a workstation that engineers use to manage and deploy programs…

    Read More

  • When Efforts to Contain a Data Breach Backfire

    PRIVACY PRIVACY Earlier this month, the administrator of the cybercrime forum Breached received a cease-and-desist letter from a cybersecurity firm. The missive alleged that an auction on the site for data stolen from 10 million customers of Mexico’s second-largest bank was fake news and harming the bank’s reputation. The administrator responded to this empty threat…

    Read More

News, Advisories and much more

Exit mobile version