-
4 reasons why CISOs can’t ignore climate change
PRIVACY PRIVACY Climate change may not be an issue synonymous with cybersecurity, but there is a growing need for the security sector to recognize and address the impact a changing climate is having. A new report from the World Meteorological Organization (WMO) stated that there is a 50% chance that, during the next five years,…
-
Smashing Security podcast #277: Bad bots, cheeky ransoms, and good deepfakes
PRIVACY PRIVACY Ransom acts of kindness are top of our mind, as we also explore how bad bots are hogging more and more of the internet’s activity, and look at how deepfakes could be a good thing after all. All this and much more is discussed in the latest edition of the award-winning “Smashing Security”…
-
CIS Benchmarks June 2022 Update
PRIVACY PRIVACY The CIS Benchmarks development team has been hard at work preparing several brand new Benchmarks and updates for June 2022. Read More
-
5 ways to prevent Ransomware attacks
PRIVACY PRIVACY This blog was written by an independent guest blogger. “Ransomware has become the enemy of the day; the threat that was first feared on Pennsylvania Avenue and subsequently detested on Wall Street is now the topic of conversation on Main Street.” Frank Dickson, Program Vice President, Cybersecurity Products at IDC In the first…
-
Clever — and Exploitable — Windows Zero-Day
PRIVACY PRIVACY Researchers have reported a still-unpatched Windows zero-day that is currently being exploited in the wild. Here’s the advisory, which includes a work-around until a patch is available. Read More
-
Europol Confirms Takedown of SMS-based FluBot Spyware
PRIVACY PRIVACY The action was prompted by the Android malware spreading aggressively through SMS around the world Read More
-
How Can We Strengthen the Cybersecurity of Critical Infrastructure? Here Are My Suggestions for CISOs, Regulators, Vendors – and All Citizens
PRIVACY PRIVACY A year after the ransomware attack against the Colonial Pipeline, what can we do to further harden the IT and OT systems of power plants, fuel pipelines, water treatment plants and similar critical infrastructure facilities? The Colonial Pipeline’s shutdown after a ransomware attack in May 2021 put a massive spotlight on the importance…
-
Logic bomb attacks: 4 famous examples
PRIVACY PRIVACY What is a logic bomb? A logic bomb is a piece of code left lying in wait on a computer that will execute under certain specified conditions and take actions the owner of that computer would consider malicious. The actual code that does the dirty work, sometimes referred to as slag code, might…
-
Connecticut Becomes Fifth US State to Enact Consumer Privacy Law
PRIVACY PRIVACY Connecticut Governor Ned Lamont officially signed into law the so-called Connecticut Privacy Act Read More
-
Twice as Many Healthcare Organizations Now Pay Ransom
PRIVACY PRIVACY Extorters focus their efforts on a perceived soft target Read More