News

  • Undetectable Backdoors in Machine-Learning Models

    PRIVACY PRIVACY New paper: “Planting Undetectable Backdoors in Machine Learning Models: Abstract: Given the computational cost and technical expertise required to train machine learning models, users may delegate the task of learning to a service provider. We show how a malicious learner can plant an undetectable backdoor into a classifier. On the surface, such a…

    Read More

  • Community Defense Against Ransomware

    PRIVACY PRIVACY This virtual Cybersecurity Modernization Summit explored the ongoing challenge of cybersecurity in the state and local government and higher education communities. Read More

    Read More

  • US Officials Increase Warnings About Russian Cyber-Attacks

    PRIVACY PRIVACY The energy and finance sectors are likely to be targeted by Russian cyber-criminals Read More

    Read More

  • Funky Pigeon Suspends Orders Following Cyber-Attack

    PRIVACY PRIVACY The retailer is currently investigating whether personal data was accessed in the attack Read More

    Read More

  • Funky Pigeon stalls orders after hackers breach its systems

    PRIVACY PRIVACY Online greeting cards business Funky Pigeon was forced to close its doors temporarily last week after a “cybersecurity incident.” Visitors to the company’s website were still being greeted as recently as Monday with a message saying that it could not accept new orders. Read More

    Read More

  • For cutting-edge web application and API protection – Trust Indusface WAAP

    PRIVACY PRIVACY Graham Cluley Security News is sponsored this week by the folks at Indusface. Thanks to the great team there for their support! With APIs grown into a dominant mechanism of the modern web, protecting web applications and APIs becomes the default requirement of AppSec. This calls for a unified risk-based mitigation solution. Indusface…

    Read More

  • LinkedIn Becomes the Most Impersonated Brand for Phishing Attacks

    PRIVACY PRIVACY The research found that phishing attempts impersonating LinkedIn made up 52% of attacks globally in Q1 2022 Read More

    Read More

  • Absolute Software launches ransomware response offering to accelerate endpoint recovery

    PRIVACY PRIVACY Endpoint and secure access solutions vendor Absolute Software has released a new offering to enable customers to prepare and accelerate their endpoint recovery in the face of ransomware attacks. The firm said Absolute Ransomware Response features several capabilities and benefits that will help organizations assess their ransomware preparedness and cyber resilience across endpoints.…

    Read More

  • Attack dwell times drop, ransomware TTPs evolve, China ramps up espionage activity

    PRIVACY PRIVACY While significant progress is being made by global organizations in relation to threat detection and response, adversaries continue to surface, innovate, and adapt to target environments with diverse cyberattacks including new extortion and ransomware tactics, techniques, and procedures (TTPs). The data comes from Mandiant’s M-Trends 2022 report based on investigations of targeted attack…

    Read More

  • Spyware was used against Catalan targets and UK prime minister and Foreign Office

    PRIVACY PRIVACY Researchers at The Citizen Lab at the University of Toronto revealed two significant findings that further highlight the widespread use of Israeli mercenary spyware apps. First, the group released fresh rounds of forensic results that uncovered Catalans’ phones targeted in Spain. Secondly, they discovered that spyware infiltrated the Prime Minister and Foreign and…

    Read More

News, Advisories and much more

Exit mobile version