News

  • 4 reasons why CISOs can’t ignore climate change

    PRIVACY PRIVACY Climate change may not be an issue synonymous with cybersecurity, but there is a growing need for the security sector to recognize and address the impact a changing climate is having. A new report from the World Meteorological Organization (WMO) stated that there is a 50% chance that, during the next five years,…

    Read More

  • Smashing Security podcast #277: Bad bots, cheeky ransoms, and good deepfakes

    PRIVACY PRIVACY Ransom acts of kindness are top of our mind, as we also explore how bad bots are hogging more and more of the internet’s activity, and look at how deepfakes could be a good thing after all. All this and much more is discussed in the latest edition of the award-winning “Smashing Security”…

    Read More

  • CIS Benchmarks June 2022 Update

    PRIVACY PRIVACY The CIS Benchmarks development team has been hard at work preparing several brand new Benchmarks and updates for June 2022. Read More

    Read More

  • 5 ways to prevent Ransomware attacks

    PRIVACY PRIVACY This blog was written by an independent guest blogger. “Ransomware has become the enemy of the day; the threat that was first feared on Pennsylvania Avenue and subsequently detested on Wall Street is now the topic of conversation on Main Street.” Frank Dickson, Program Vice President, Cybersecurity Products at IDC In the first…

    Read More

  • Clever — and Exploitable — Windows Zero-Day

    PRIVACY PRIVACY Researchers have reported a still-unpatched Windows zero-day that is currently being exploited in the wild. Here’s the advisory, which includes a work-around until a patch is available. Read More

    Read More

  • Europol Confirms Takedown of SMS-based FluBot Spyware

    PRIVACY PRIVACY The action was prompted by the Android malware spreading aggressively through SMS around the world Read More

    Read More

  • How Can We Strengthen the Cybersecurity of Critical Infrastructure? Here Are My Suggestions for CISOs, Regulators, Vendors – and All Citizens

    PRIVACY PRIVACY A year after the ransomware attack against the Colonial Pipeline, what can we do to further harden the IT and OT systems of power plants, fuel pipelines, water treatment plants and similar critical infrastructure facilities? The Colonial Pipeline’s shutdown after a ransomware attack in May 2021 put a massive spotlight on the importance…

    Read More

  • Logic bomb attacks: 4 famous examples

    PRIVACY PRIVACY What is a logic bomb? A logic bomb is a piece of code left lying in wait on a computer that will execute under certain specified conditions and take actions the owner of that computer would consider malicious. The actual code that does the dirty work, sometimes referred to as slag code, might…

    Read More

  • Connecticut Becomes Fifth US State to Enact Consumer Privacy Law

    PRIVACY PRIVACY Connecticut Governor Ned Lamont officially signed into law the so-called Connecticut Privacy Act Read More

    Read More

  • Twice as Many Healthcare Organizations Now Pay Ransom

    PRIVACY PRIVACY Extorters focus their efforts on a perceived soft target Read More

    Read More

News, Advisories and much more

Exit mobile version