-
Securing Critical Infrastructure: It’s Complicated
PRIVACY PRIVACY In his testimony before the U.S. House Committee on Homeland Security on April 5, Amit Yoran, Tenable’s chairman and CEO, highlighted real-world challenges and offered guidance on how government can help. When leaders in government and the private sector speak about critical infrastructure, we tend to describe it as if it were one…
-
Borat Expands RAT Capabilities
PRIVACY PRIVACY New Remote Access Trojan that provides ransomware services to threat actors is no laughing matter Read More
-
Teleport bridges human and machine access management with Machine ID
PRIVACY PRIVACY Teleport, an open-source platform designed to provide zero trust access management for servers and cloud applications, has announced the availability of Teleport 9, the latest version of its unified access plane. To read this article in full, please click here Read More
-
The Works hit by hackers, UK retailer shuts some stores after problems with payment tills
PRIVACY PRIVACY UK high street retailer The Works has shut some of its stores following a “cyber security incident” which saw hackers gain unauthorised access to its systems. Read more in my article on the Hot for Security blog. Read More
-
Cato Networks introduces device context-driven access control to tackle remote working and BYOD risks
PRIVACY PRIVACY SASE platform provider Cato Networks has introduced a new risk-based application access control for combatting security threats and productivity challenges posed by remote working and bring your own device (BYOD). The vendor said that with its new control, enterprise policies can consider real-time device context when restricting access to capabilities within corporate applications,…
-
Hackers Using Fake Police Data Requests against Tech Companies
PRIVACY PRIVACY Brian Krebs has a detailed post about hackers using fake police data requests to trick companies into handing over data. Virtually all major technology companies serving large numbers of users online have departments that routinely review and process such requests, which are typically granted as long as the proper documents are provided and…
-
Cyber threats increasingly target video games – The metaverse is next
PRIVACY PRIVACY Photo by Adi Goldstein on Unsplash This blog was written by an independent guest blogger. The technical infrastructure of video games requires a significant level of access to private data, whether through client-server side interactions or financial data. This has led to what Computer Weekly describes as a ‘relentless’ attack on the video game industry, with attacks…
-
Retailer The Works Closes Stores After Cyber-Attack
PRIVACY PRIVACY Suspected ransomware to blame but no card details taken Read More
-
Global APT Groups Use Ukraine War for Phishing Lures
PRIVACY PRIVACY Cyber-espionage campaigns make the most of big news event Read More
-
WhatsApp ‘Voice Message’ Is an Info-Stealing Phishing Attack
PRIVACY PRIVACY Armorblox warns of new campaign using Russian domain Read More