-
Details of an NSA Hacking Operation
PRIVACY PRIVACY Pangu Lab in China just published a report of a hacking operation by the Equation Group (aka the NSA). It noticed the hack in 2013, and was able to map it with Equation Group tools published by the Shadow Brokers (aka some Russian group). …the scope of victims exceeded 287 targets in 45…
-
Purported massive leak of Russian soldiers’ data could sink morale, digital security
PRIVACY PRIVACY In what security experts say is an unprecedented wartime leak, Ukrainian newspaper Ukrayinska Pravda published what it claims are the personal details of 120,000 Russian service personnel fighting in Ukraine. The nearly 6,000 pages of information, if accurate, contain names, registration numbers, and place of service for well over half of the estimated…
-
Staying safe online when you live off-grid
PRIVACY PRIVACY This blog was written by an independent guest blogger. Over 250,000 people in the US live off the grid, meaning they do not rely on public utilities such as electricity and water. Their aim is generally to live more independently and self-sufficiently, rely on solar or other eco-friendly technologies, and build a stronger connection…
-
Vulnerability Exploit Attempts Surge Tenfold Against Ukrainian Websites
PRIVACY PRIVACY Thirty Ukrainian university sites compromised during first days of invasion Read More
-
New CSO appointments in India
PRIVACY PRIVACY With security taking centre stage across the enterprise, the role of the CSO or CISO is becoming increasingly complex and challenging, but exciting, nonetheless. As these executives find new roles in which they can bring their experience and vision to bear, we’ll keep you up to date on new appointments and movements in the…
-
Russia Denies Satellite Hacking and Warns of Wider War
PRIVACY PRIVACY Roscosmos boss says such a provocation would be causus belli Read More
-
3 steps to supply chain resilience
PRIVACY PRIVACY The COVID pandemic has taught us a lot of things, one of which is that supply chain resilience matters a lot. Having a resilient supply chain in the business sense can be the difference between thriving under dynamic market conditions or experiencing critical business disruptions, including those caused by cyberattacks. These disruptions can…
-
NATO Completes Quantum-Safe Comms Test
PRIVACY PRIVACY UK company’s VPN could mitigate risk of quantum computer hacking Read More
-
Who deleted the database? Find out with Teleport
PRIVACY PRIVACY Graham Cluley Security News is sponsored this week by the folks at Teleport. Thanks to the great team there for their support! Imagine the scene – you’re woken up at 3 am, only to discover your worst nightmare. The new intern just accidentally deleted the production database during routine maintenance. You quickly restore…
-
HSB Survey Finds EV Security Fears
PRIVACY PRIVACY US SMB owners expand fleets with electric vehicles despite security misgivings Read More