-
Who dropped the DB? Find out with Teleport Database Access
PRIVACY PRIVACY Graham Cluley Security News is sponsored this week by the folks at Teleport. Thanks to the great team there for their support! You’re woken up at 3 am, only to discover your worst nightmare. The new intern just deleted the production database during routine maintenance by accident. You quickly restore from a backup.…
-
Twitter blackout for Vodafone customers
PRIVACY PRIVACY Vodafone customers in the UK are spitting tacks after an “issue” has left them unable to use Twitter properly for days, after the display of images and movie files, and – in some cases – the entire website, was blocked. Read More
-
Argo CD flaw puts cloud infrastructure at risk
PRIVACY PRIVACY A high-risk vulnerability that could allow attackers to steal sensitive information secrets from software projects was found and fixed in Argo CD, a widely used continuous delivery platform for applications deployed via Kubernetes. According to researchers from cloud application security Apiiro, who found and reported the vulnerability, attackers could feed a maliciously crafted…
-
Savvy cryptomining malware campaign targets Asian cloud service providers
PRIVACY PRIVACY Asian cloud service providers have been targeted by a sophisticated malware campaign designed to steal computing power for mining cryptocurrency. The attack techniques deployed by the CoinStomp malware include timestomping (modification of a file’s timestamp), removal of system cryptographic policies, and use of a reverse shell to initiate command and control communications with…
-
Information systems and cybersecurity: Connections in UX and beyond
PRIVACY PRIVACY Image source: Pexels This blog was written by an independent guest blogger. Information systems and cybersecurity go hand in hand. Understanding the relationship between the two is paramount for enterprises to optimize the user experience (UX). How information systems transform enterprises Enterprises use information systems to organize, process, analyze, and disseminate data. In…
-
UK Adds New Offenses to Online Safety Bill
PRIVACY PRIVACY UK Adds New Offenses to Online Safety Bill The UK government has unveiled plans to strengthen its Online Safety Bill, which includes the creation of new criminal offenses. The legislation, first drafted in May 2021, will place new obligations on social media sites and other services hosting user-generated content or allowing people to talk to…
-
European Police Flag 500+ Pieces of Terrorist Content
PRIVACY PRIVACY European Police Flag 500+ Pieces of Terrorist Content European police have found and referred 563 pieces of terrorist content to service providers in the region, as a UK man was jailed for sharing a bomb-making manual online. The Referral Action Day took place last week at Europol’s headquarters. The EU’s Internet Referral Unit (EU…
-
Swissport Ransomware Attack Delayed Flights
PRIVACY PRIVACY Swissport Ransomware Attack Delayed Flights Airport services giant Swissport is restoring its IT systems after a ransomware attack struck late last week, delaying flights. The Zurich-headquartered firm operates everything from check-in gates and airport security to baggage handling, aircraft fuelling and de-icing and lounge hospitality. It claims to have provided ground services to 97 million…
-
CISOs are burned out and falling behind
PRIVACY PRIVACY The CISO’s text was brief but telling: “I never want an operational role again,” it read, arriving on Jeff Pollard’s phone in December as security teams scrambled to deal with the latest headline-making threat, Log4j. “He’s an effective CISO with a long tenure, but his mentality was ‘Here we go again.’ He was…
-
Social engineering: Definition, examples, and techniques
PRIVACY PRIVACY What is social engineering? Social engineering is the art of exploiting human psychology, rather than technical hacking techniques, to gain access to buildings, systems, or data. For example, instead of trying to find a software vulnerability, a social engineer might call an employee and pose as an IT support person, trying to trick…