-
Anti-Russian denial-of-service app actually infects pro-Ukrainian activists
PRIVACY PRIVACY An app which purported to launch distributed denial-of-service (DDoS) attacks against the internet infrastructure of Russia, was in reality secretly installing malware on to the devices of pro-Ukrainian activists. Read more in my article on the Hot for Security blog. Read More
-
How CIS Hardened Images Can Help with Cloud Security
PRIVACY PRIVACY Hardening an OS in the cloud can be a tedious process without hardened virtual images. Learn how CIS’s Hardened Images can help with cloud security. […] Read More
-
Russian Adversaries Target DropBox and Google Drive in New Campaign
PRIVACY PRIVACY The group Cloaked Ursula is increasingly using popular online storage services because it makes attacks difficult to detect and prevent Read More
-
Perception Point launches managed security service to help eliminate web browser threats
PRIVACY PRIVACY Perception Point has announced the launch of a new managed security service designed to eliminate web browser threats to organizations. According to the firm, Perception Point Advanced Browser Security adds managed, enterprise-grade security to native Chrome and Edge browsers allowing users to browse the web or access SaaS applications without exposing enterprise data…
-
Brazen, Unsophisticated and Illogical: Understanding the LAPSUS$ Extortion Group
PRIVACY PRIVACY Having gained the industry’s attention in the first months of 2022, the LAPSUS$ extortion group has largely gone quiet. What can we learn from this extortion group’s story and tactics? In early 2022, the LAPSUS$ group broke onto the scene with flashy and disruptive attacks. While occasionally lumped in with ransomware groups, LAPSUS$…
-
Everything to know about SaaS data security
PRIVACY PRIVACY This blog was written by an independent guest blogger. Software-as-a-service (SaaS) is becoming the dominant way enterprises access digital tools. While this delivery method has many advantages, from scalability to consistent security updates, it can create significant vulnerabilities if developers and users aren’t careful. Organizations today use more than 100 SaaS apps on…
-
Russian Hackers Target Ukrainians Via Copycat DoS App
PRIVACY PRIVACY Google spots first Android malware distributed by Turla group Read More
-
Legal Experts Concerned Over New UK Digital Reform Bill
PRIVACY PRIVACY Proposed legislation could imperil adequacy agreement with EU Read More
-
How to manage Microsoft’s Excel and Office macro blocking
PRIVACY PRIVACY Microsoft has pulled back on its decision to block downloaded Excel files containing macros by default. They have said they will push this change out again in the future. If you were caught flat-footed by this decision and suddenly couldn’t figure out how to unblock your Excel files that you relied upon, you…
-
Breaking down CIS’s new software supply chain security guidance
PRIVACY PRIVACY Securing the software supply chain continues to be one of the most discussed topics currently among IT and cybersecurity leaders. A study by In-Q-Tel researchers shows a rapid rise in software supply chain attacks starting around 2016, going from almost none in 2015 to about 1,500 in 2020. The Cloud Native Computing Foundation’s…