News

  • Anti-Russian denial-of-service app actually infects pro-Ukrainian activists

    PRIVACY PRIVACY An app which purported to launch distributed denial-of-service (DDoS) attacks against the internet infrastructure of Russia, was in reality secretly installing malware on to the devices of pro-Ukrainian activists. Read more in my article on the Hot for Security blog. Read More

    Read More

  • How CIS Hardened Images Can Help with Cloud Security

    PRIVACY PRIVACY Hardening an OS in the cloud can be a tedious process without hardened virtual images. Learn how CIS’s Hardened Images can help with cloud security. […] Read More

    Read More

  • Russian Adversaries Target DropBox and Google Drive in New Campaign

    PRIVACY PRIVACY The group Cloaked Ursula is increasingly using popular online storage services because it makes attacks difficult to detect and prevent Read More

    Read More

  • Perception Point launches managed security service to help eliminate web browser threats

    PRIVACY PRIVACY Perception Point has announced the launch of a new managed security service designed to eliminate web browser threats to organizations. According to the firm, Perception Point Advanced Browser Security adds managed, enterprise-grade security to native Chrome and Edge browsers allowing users to browse the web or access SaaS applications without exposing enterprise data…

    Read More

  • Brazen, Unsophisticated and Illogical: Understanding the LAPSUS$ Extortion Group

    PRIVACY PRIVACY Having gained the industry’s attention in the first months of 2022, the LAPSUS$ extortion group has largely gone quiet. What can we learn from this extortion group’s story and tactics? In early 2022, the LAPSUS$ group broke onto the scene with flashy and disruptive attacks. While occasionally lumped in with ransomware groups, LAPSUS$…

    Read More

  • Everything to know about SaaS data security

    PRIVACY PRIVACY This blog was written by an independent guest blogger. Software-as-a-service (SaaS) is becoming the dominant way enterprises access digital tools. While this delivery method has many advantages, from scalability to consistent security updates, it can create significant vulnerabilities if developers and users aren’t careful. Organizations today use more than 100 SaaS apps on…

    Read More

  • Russian Hackers Target Ukrainians Via Copycat DoS App

    PRIVACY PRIVACY Google spots first Android malware distributed by Turla group Read More

    Read More

  • Legal Experts Concerned Over New UK Digital Reform Bill

    PRIVACY PRIVACY Proposed legislation could imperil adequacy agreement with EU Read More

    Read More

  • How to manage Microsoft’s Excel and Office macro blocking

    PRIVACY PRIVACY Microsoft has pulled back on its decision to block downloaded Excel files containing macros by default. They have said they will push this change out again in the future. If you were caught flat-footed by this decision and suddenly couldn’t figure out how to unblock your Excel files that you relied upon, you…

    Read More

  • Breaking down CIS’s new software supply chain security guidance

    PRIVACY PRIVACY Securing the software supply chain continues to be one of the most discussed topics currently among IT and cybersecurity leaders. A study by In-Q-Tel researchers shows a rapid rise in software supply chain attacks starting around 2016, going from almost none in 2015 to about 1,500 in 2020. The Cloud Native Computing Foundation’s…

    Read More

News, Advisories and much more

Exit mobile version