News

  • Penetration Testing as a Service (PTaaS): the evolution of Penetration Testing at AT&T

    PRIVACY PRIVACY Definition: Let us start by defining Penetration Testing as a Service (also known as PTaaS) because there are several different definitions and variations being used throughout the industry. Some of the similarities include: Continuous or more frequent penetration tests to create a find – fix – verify loop that provides a closer to…

    Read More

  • Microsoft Disrupts Russian Cyber-Espionage Group Seaborgium

    PRIVACY PRIVACY APT group focused on classic data theft via email accounts Read More

    Read More

  • Water Company Says Supply Safe After Ransom Group Claims

    PRIVACY PRIVACY South Staffordshire Water admits it was compromised Read More

    Read More

  • Vulnerability eXploitability Exchange explained: How VEX makes SBOMs actionable

    PRIVACY PRIVACY The fallout of the SolarWinds cybersecurity incident, coupled with Cybersecurity Executive Order (EO) put the topic of software supply chain security, and by association, software bills of material (SBOM) center stage in the security dialog. Coupled with the Log4j vulnerability and impact that left countless organizations scrambling to determine the impact, SBOMs are…

    Read More

  • Software Patches Flaw on macOS Could Let Hackers Bypass All Security Levels

    PRIVACY PRIVACY After deploying the initial attack, the researcher was able to escape the macOS sandbox Read More

    Read More

  • Luckymouse Uses Compromised MiMi Chat App to Target Windows and Linux Systems

    PRIVACY PRIVACY The news comes from two different security reports published by SEKOIA and Trend Micro Read More

    Read More

  • Dutch Authorities Arrest Tornado Cash Developer Following US Sanctions on Crypto Mixer Firm

    PRIVACY PRIVACY The Financial Advanced Cyber Team of the FIOD started the criminal investigation in June Read More

    Read More

  • $23 Million YouTube Royalties Scam

    PRIVACY PRIVACY Scammers were able to convince YouTube that other peoples’ music was their own. They successfully stole $23 million before they were caught. No one knows how common this scam is, and how much money total is being stolen in this way. Presumably this is not an uncommon fraud. While the size of the…

    Read More

  • #DEFCON: How Sanctions Impact Internet Operators

    PRIVACY PRIVACY Following government sanctions against Russia, Internet providers have had to learn how to implement actions Read More

    Read More

  • #DEFCON: CISA Director Praises Congress and International Cybersecurity Cooperation

    PRIVACY PRIVACY Jen Easterly discusses the progress and challenges at CISA Read More

    Read More

News, Advisories and much more

Exit mobile version