-
Cybercrime a Key Revenue Stream For North Korea’s Weapons Program
PRIVACY PRIVACY North Korea stole millions of dollars in crypto assets in at least one major hack Read More
-
Over 60% of Organizations Expose SSH to the Internet
PRIVACY PRIVACY ExtraHop study finds sensitive protocols are not being managed securely Read More
-
Cybersecurity Snapshot: 6 Things That Matter Right Now
PRIVACY PRIVACY Topics that are top of mind for the week ending Aug. 5 | Don’t take your eye off the Log4j ball. The dangers of unsupported software. Why low MFA adoption is everyone’s problem. Preventing ransomware attacks. And much more! 1. Log4j: It’s a marathon race not a sprint Like an insufferable houseguest who…
-
UK Branded Europe’s “Capital of Card Fraud”
PRIVACY PRIVACY Think tank claims British consumers suffer the highest losses Read More
-
Chinese Info Ops Campaign Tied to PR Firm
PRIVACY PRIVACY Inauthentic internet assets used to improve China’s image abroad Read More
-
Kaspersky blames “misconfiguration” after customers receive “dear and lovely” email
PRIVACY PRIVACY Did Russian security Kaspersky really choose to send an email to its customers addressing them as “dear and lovely”? Had Kaspersky suffered a data breach? Had a hacker found a way to send messages to Kaspersky’s customer base? Read More
-
Palo Alto debuts Unit 42 team for managed detection and response
PRIVACY PRIVACY Palo Alto Networks this week announced the immediate availability of Unit 42 Managed Detection and Response (MDR), a service providing on-call cybersecurity specialists to track and respond to security threats in real time. The idea is to back Palo Alto’s existing automated Cortex extended detection and response (XDR) platform with human expertise, dedicating…
-
How To Get Your Head Around Your Kids’ Online Gaming Life
PRIVACY PRIVACY Let’s be honest – many of us parents aren’t big fans of gaming. In fact, some of us have probably even been known to roll our eyes or groan when we think about just how long our kids spend playing online games. But if there is one thing I’ve learned after 25 years…
-
Hackers Exploit Atlassian Confluence Vulnerability to Deploy New ‘Ljl’ Backdoor
PRIVACY PRIVACY The TA likely used RAR and 7zip to archive files and folders from multiple directories Read More
-
CIS Benchmarks August 2022 Update
PRIVACY PRIVACY The CIS Benchmarks development team has been hard at work preparing several brand new Benchmarks and updates for August 2022. Read More