News

  • Exiger launches data-agnostic supply chain risk platform

    PRIVACY PRIVACY New York-based risk management company Exiger this week launched a new supply chain risk monitoring service, designed to incorporate a wide and customizeable array of data sources into its calcluations. The company’s Supply Chain Explorer is a fully as-a-service offering – users don’t have to host it in their data centers or run…

    Read More

  • House Passes Better Cybercrime Metrics Act

    PRIVACY PRIVACY Bill requiring FBI to report cybercrime metrics and cyber enabled crime categories clears Congress Read More

    Read More

  • NSA Employee Accused of Sharing National Defense Secrets

    PRIVACY PRIVACY Indictment alleges NSA employee used personal email account to send Top Secret info Read More

    Read More

  • US Cyber Command Partners with APUS

    PRIVACY PRIVACY American Public University System joins CYBERCOM’s Academic Engagement Network Read More

    Read More

  • Defending Against Russian Cyber-Attacks: Guidance for SLTTs

    PRIVACY PRIVACY CIS and the MS- and EI-ISACs share how U.S. state and local governments can defend themselves against Russian cyber-attacks. Read More

    Read More

  • Police charge UK teenagers in relation to LAPSUS$ hacking group investigation

    PRIVACY PRIVACY Two teenagers from the UK have been charged by police over hacking offenses in relation to an international investigation into the LAPSUS$ group. The cybercriminal gang is believed to be behind several recent high-profile cyberattacks including the data breach of internal systems of cloud-based authentication software provider Okta. The news comes after police…

    Read More

  • Two teenagers charged in relation to LAPSUS$ hacking group investigation

    PRIVACY PRIVACY City of London Police have charged two teenagers in relation to the ongoing investigation into the LAPSUS$ hacking group. Read More

    Read More

  • Bypassing Two-Factor Authentication

    PRIVACY PRIVACY These techniques are not new, but they’re increasingly popular: …some forms of MFA are stronger than others, and recent events show that these weaker forms aren’t much of a hurdle for some hackers to clear. In the past few months, suspected script kiddies like the Lapsus$ data extortion gang and elite Russian-state threat…

    Read More

  • UK Spy Chief Hails Government Cell Tackling Kremlin Fake News

    PRIVACY PRIVACY GCHQ boss says intelligence is being declassified on an unprecedented scale Read More

    Read More

  • Over Half of Data Security Incidents Caused by Insiders

    PRIVACY PRIVACY Most EMEA organizations don’t have a strategy for dealing with them Read More

    Read More

News, Advisories and much more

Exit mobile version