News

  • Who dropped the DB? Find out with Teleport Database Access

    PRIVACY PRIVACY Graham Cluley Security News is sponsored this week by the folks at Teleport. Thanks to the great team there for their support! You’re woken up at 3 am, only to discover your worst nightmare. The new intern just deleted the production database during routine maintenance by accident. You quickly restore from a backup.…

    Read More

  • Twitter blackout for Vodafone customers

    PRIVACY PRIVACY Vodafone customers in the UK are spitting tacks after an “issue” has left them unable to use Twitter properly for days, after the display of images and movie files, and – in some cases – the entire website, was blocked. Read More

    Read More

  • Argo CD flaw puts cloud infrastructure at risk

    PRIVACY PRIVACY A high-risk vulnerability that could allow attackers to steal sensitive information secrets from software projects was found and fixed in Argo CD, a widely used continuous delivery platform for applications deployed via Kubernetes. According to researchers from cloud application security Apiiro, who found and reported the vulnerability, attackers could feed a maliciously crafted…

    Read More

  • Savvy cryptomining malware campaign targets Asian cloud service providers

    PRIVACY PRIVACY Asian cloud service providers have been targeted by a sophisticated malware campaign designed to steal computing power for mining cryptocurrency. The attack techniques deployed by the CoinStomp malware include timestomping (modification of a file’s timestamp), removal of system cryptographic policies, and use of a reverse shell to initiate command and control communications with…

    Read More

  • Information systems and cybersecurity: Connections in UX and beyond

    PRIVACY PRIVACY Image source: Pexels This blog was written by an independent guest blogger. Information systems and cybersecurity go hand in hand. Understanding the relationship between the two is paramount for enterprises to optimize the user experience (UX). How information systems transform enterprises Enterprises use information systems to organize, process, analyze, and disseminate data. In…

    Read More

  • UK Adds New Offenses to Online Safety Bill

    PRIVACY PRIVACY UK Adds New Offenses to Online Safety Bill The UK government has unveiled plans to strengthen its Online Safety Bill, which includes the creation of new criminal offenses. The legislation, first drafted in May 2021, will place new obligations on social media sites and other services hosting user-generated content or allowing people to talk to…

    Read More

  • European Police Flag 500+ Pieces of Terrorist Content

    PRIVACY PRIVACY European Police Flag 500+ Pieces of Terrorist Content European police have found and referred 563 pieces of terrorist content to service providers in the region, as a UK man was jailed for sharing a bomb-making manual online. The Referral Action Day took place last week at Europol’s headquarters. The EU’s Internet Referral Unit (EU…

    Read More

  • Swissport Ransomware Attack Delayed Flights

    PRIVACY PRIVACY Swissport Ransomware Attack Delayed Flights Airport services giant Swissport is restoring its IT systems after a ransomware attack struck late last week, delaying flights. The Zurich-headquartered firm operates everything from check-in gates and airport security to baggage handling, aircraft fuelling and de-icing and lounge hospitality. It claims to have provided ground services to 97 million…

    Read More

  • CISOs are burned out and falling behind

    PRIVACY PRIVACY The CISO’s text was brief but telling: “I never want an operational role again,” it read, arriving on Jeff Pollard’s phone in December as security teams scrambled to deal with the latest headline-making threat, Log4j. “He’s an effective CISO with a long tenure, but his mentality was ‘Here we go again.’ He was…

    Read More

  • Social engineering: Definition, examples, and techniques

    PRIVACY PRIVACY What is social engineering? Social engineering is the art of exploiting human psychology, rather than technical hacking techniques, to gain access to buildings, systems, or data. For example, instead of trying to find a software vulnerability, a social engineer might call an employee and pose as an IT support person, trying to trick…

    Read More

News, Advisories and much more

Exit mobile version