-
Penetration Testing as a Service (PTaaS): the evolution of Penetration Testing at AT&T
PRIVACY PRIVACY Definition: Let us start by defining Penetration Testing as a Service (also known as PTaaS) because there are several different definitions and variations being used throughout the industry. Some of the similarities include: Continuous or more frequent penetration tests to create a find – fix – verify loop that provides a closer to…
-
Microsoft Disrupts Russian Cyber-Espionage Group Seaborgium
PRIVACY PRIVACY APT group focused on classic data theft via email accounts Read More
-
Water Company Says Supply Safe After Ransom Group Claims
PRIVACY PRIVACY South Staffordshire Water admits it was compromised Read More
-
Vulnerability eXploitability Exchange explained: How VEX makes SBOMs actionable
PRIVACY PRIVACY The fallout of the SolarWinds cybersecurity incident, coupled with Cybersecurity Executive Order (EO) put the topic of software supply chain security, and by association, software bills of material (SBOM) center stage in the security dialog. Coupled with the Log4j vulnerability and impact that left countless organizations scrambling to determine the impact, SBOMs are…
-
Software Patches Flaw on macOS Could Let Hackers Bypass All Security Levels
PRIVACY PRIVACY After deploying the initial attack, the researcher was able to escape the macOS sandbox Read More
-
Luckymouse Uses Compromised MiMi Chat App to Target Windows and Linux Systems
PRIVACY PRIVACY The news comes from two different security reports published by SEKOIA and Trend Micro Read More
-
Dutch Authorities Arrest Tornado Cash Developer Following US Sanctions on Crypto Mixer Firm
PRIVACY PRIVACY The Financial Advanced Cyber Team of the FIOD started the criminal investigation in June Read More
-
$23 Million YouTube Royalties Scam
PRIVACY PRIVACY Scammers were able to convince YouTube that other peoples’ music was their own. They successfully stole $23 million before they were caught. No one knows how common this scam is, and how much money total is being stolen in this way. Presumably this is not an uncommon fraud. While the size of the…
-
#DEFCON: How Sanctions Impact Internet Operators
PRIVACY PRIVACY Following government sanctions against Russia, Internet providers have had to learn how to implement actions Read More
-
#DEFCON: CISA Director Praises Congress and International Cybersecurity Cooperation
PRIVACY PRIVACY Jen Easterly discusses the progress and challenges at CISA Read More