News

  • Ukrainian Energy Supplier Targeted by New Industroyer Malware

    PRIVACY PRIVACY Researchers reveal the Sandworm group attempted to cut power to a large region of Ukraine Read More

    Read More

  • Security blind spots in the era of cloud communication & collaboration. Are you protected?

    PRIVACY PRIVACY Graham Cluley Security News is sponsored this week by the folks at Perception Point. Thanks to the great team there for their support! The need to communicate, collaborate and do business on a global level has created a proliferation of cloud based applications and services: Email. Cloud Storage. Messaging platforms. CRM. Digital Apps…

    Read More

  • Russian Cyberattack against Ukrainian Power Grid Prevented

    PRIVACY PRIVACY A Russian cyberweapon, similar to the one used in 2016, was detected and removed before it could be used. Key points: ESET researchers collaborated with CERT-UA to analyze the attack against the Ukrainian energy company The destructive actions were scheduled for 2022-04-08 but artifacts suggest that the attack had been planned for at…

    Read More

  • Corporate structure and roles in InfoSec

    PRIVACY PRIVACY This blog was written by an independent guest blogger. When assessing the corporate governance of modern companies, one cannot help but note the obvious problems with information security. To solve these problems, it is crucial to carry out initiatives that, on the one hand, are complex, multifaceted, and nonobvious, and on the other,…

    Read More

  • Ransomware Breach Victim Numbers Fall by 25% in Q1 2022

    PRIVACY PRIVACY Activity is set to pick up this year as new groups appear Read More

    Read More

  • Who is your biggest insider threat?

    PRIVACY PRIVACY Penetration testing has shown cybersecurity manager David Murphy just how problematic people can be. In his career, he has seen people pick up and use dropped thumb drives, give up passwords over the phone and, yes, even click on simulated phishing links. He has also seen the real-world consequences of such actions. […

    Read More

  • Crypto Dev Gets Five Years for Helping North Korea Evade Sanctions

    PRIVACY PRIVACY Virgil Griffith presented at a conference in Pyongyang Read More

    Read More

  • April Records First Patch Tuesday of 2022 with 100+ CVEs

    PRIVACY PRIVACY Microsoft fixes two zero-days in latest update round Read More

    Read More

  • CitySprint confirms security breach, warns delivery drivers their personal data may be in the hands of hackers

    PRIVACY PRIVACY Same-day delivery firm CitySprint has warned couriers it has suffered a data breach that may have allowed hackers to access their sensitive personal data. Read More

    Read More

  • What is phishing? Examples, types, and techniques

    PRIVACY PRIVACY Phishing definition Phishing is a type of cyberattack that uses disguised email as a weapon. These attacks use social engineering techniques to trick the email recipient into believing that the message is something they want or need—a request from their bank, for instance, or a note from someone in their company—and to click…

    Read More

News, Advisories and much more

Exit mobile version