-
Crypto Scammers exploit talk on Cryptocurrency
PRIVACY PRIVACY By Oliver Devane McAfee has identified several Youtube channels which were live-streaming a modified version of a live stream called ‘The B Word’ where Elon Musk, Cathie Wood, and Jack Dorsey discuss various aspects of cryptocurrency. The modified live streams make the original video smaller and put a frame around it advertising malicious…
-
Join CIS at the 2022 AWS Summit in Washington, D.C.
PRIVACY PRIVACY CIS excited to sponsor and attend the 2022 AWS Summit Washington, DC at Booth 520. Join us and learn about CIS STIG resources. Read More
-
Wrongly configured Google Cloud API potentially creates dangerous functionality
PRIVACY PRIVACY Some odd and potentially dangerous behavior within the Google Cloud Platform (GCP) was revealed by cloud security company Mitiga Thursday. If GCP is not configured correctly, it could be exploited by attackers to engage in malicious activity inside a user’s cloud environment, according to a blog posted on the Israeli company’s website. The…
-
CVE-2022-1388: Authentication Bypass in F5 BIG-IP
PRIVACY PRIVACY CVE-2022-1388: Authentication Bypass in F5 BIG-IP F5 patched an authentication bypass in its BIG-IP product family that could lead to arbitrary command execution. Background As part of its Quarterly Security Notification for May 2022, F5 patched CVE-2022-1388, a critical authentication bypass vulnerability in BIG-IP, a family of hardware and software solutions used for…
-
Hunter Biden Laptop Repairman Sues Over Hacker Allegations
PRIVACY PRIVACY Repairman sues politician and news media for allegedly calling him a hacker and a Russian asset Read More
-
GitHub to Enforce Two-Factor Authentication
PRIVACY PRIVACY Code hosting platform to make 2FA mandatory for all code contributors by the end of 2023 Read More
-
Cybersecurity and resilience: board-level issues
PRIVACY PRIVACY Resilience means more than bouncing back from a fall at a moment of significantly increased threats. When addressing resilience, it’s vital to focus on long-term goals instead of short-term benefits. Resilience in the cybersecurity context should resist, absorb, recover, and adapt to business disruptions. Cyber resiliency can’t be accomplished overnight. For the longest…
-
This World Password Day, Here’s How a Password Manager Can Simplify Your Life
PRIVACY PRIVACY Passwords: we entrust our most important data to these strings of letters, numbers, and special characters. So, we should make sure our passwords are words or phrases that we can easily remember, right? While this might be the most convenient option, there are more secure ways to digitally lock up your most sensitive…
-
Dell offers data, app recovery support for multicloud assets
PRIVACY PRIVACY Dell is adding data recovery solutions to its APEX portfolio, for data centers and public clouds including Azure and AWS. Read More
-
Illuminate Data Breach Impacts More School Districts
PRIVACY PRIVACY Colorado now affected by incident that compromised data of 820,000 NYC students Read More