News

  • Securing Critical Infrastructure: It’s Complicated

    PRIVACY PRIVACY In his testimony before the U.S. House Committee on Homeland Security on April 5, Amit Yoran, Tenable’s chairman and CEO, highlighted real-world challenges and offered guidance on how government can help. When leaders in government and the private sector speak about critical infrastructure, we tend to describe it as if it were one…

    Read More

  • Borat Expands RAT Capabilities

    PRIVACY PRIVACY New Remote Access Trojan that provides ransomware services to threat actors is no laughing matter Read More

    Read More

  • Teleport bridges human and machine access management with Machine ID

    PRIVACY PRIVACY Teleport, an open-source platform designed to provide zero trust access management for servers and cloud applications, has announced the availability of Teleport 9, the latest version of its unified access plane.   To read this article in full, please click here Read More

    Read More

  • The Works hit by hackers, UK retailer shuts some stores after problems with payment tills

    PRIVACY PRIVACY UK high street retailer The Works has shut some of its stores following a “cyber security incident” which saw hackers gain unauthorised access to its systems. Read more in my article on the Hot for Security blog. Read More

    Read More

  • Cato Networks introduces device context-driven access control to tackle remote working and BYOD risks

    PRIVACY PRIVACY SASE platform provider Cato Networks has introduced a new risk-based application access control for combatting security threats and productivity challenges posed by remote working and bring your own device (BYOD). The vendor said that with its new control, enterprise policies can consider real-time device context when restricting access to capabilities within corporate applications,…

    Read More

  • Hackers Using Fake Police Data Requests against Tech Companies

    PRIVACY PRIVACY Brian Krebs has a detailed post about hackers using fake police data requests to trick companies into handing over data. Virtually all major technology companies serving large numbers of users online have departments that routinely review and process such requests, which are typically granted as long as the proper documents are provided and…

    Read More

  • Cyber threats increasingly target video games – The metaverse is next

    PRIVACY PRIVACY Photo by Adi Goldstein on Unsplash This blog was written by an independent guest blogger. The technical infrastructure of video games requires a significant level of access to private data, whether through client-server side interactions or financial data. This has led to what Computer Weekly describes as a ‘relentless’ attack on the video game industry, with attacks…

    Read More

  • Retailer The Works Closes Stores After Cyber-Attack

    PRIVACY PRIVACY Suspected ransomware to blame but no card details taken Read More

    Read More

  • Global APT Groups Use Ukraine War for Phishing Lures

    PRIVACY PRIVACY Cyber-espionage campaigns make the most of big news event Read More

    Read More

  • WhatsApp ‘Voice Message’ Is an Info-Stealing Phishing Attack

    PRIVACY PRIVACY Armorblox warns of new campaign using Russian domain Read More

    Read More

News, Advisories and much more

Exit mobile version