News

  • #Enigma2022: Contextual Security Should Supplement Machine Learning for Malware Detection

    PRIVACY PRIVACY #Enigma2022: Contextual Security Should Supplement Machine Learning for Malware Detection Malware continues to be one of the most effective attack vectors in use today, and it is often combatted with machine learning-powered security tools for intrusion detection and prevention systems. According to Nidhi Rastogi, Assistant Professor at the Rochester Institute of Technology, machine…

    Read More

  • KP Snacks Hit by Cyber-attack

    PRIVACY PRIVACY KP Snacks Hit by Cyber-attack Brits could be facing a snack shortage following a cyber-attack on 169-year-old food producer KP Snacks.  The German-owned maker of KP Nuts, Hula Hoops, Choc Dips, Nik Naks and Butterkist popcorn was targeted by threat actors on Friday. After gaining access to the company’s network, hackers deployed ransomware and…

    Read More

  • CVE-2022-20699, CVE-2022-20700, CVE-2022-20708: Critical Flaws in Cisco Small Business RV Series Routers

    PRIVACY PRIVACY Cisco patches 15 flaws in Cisco Small Business RV Series Routers, including three with critical 10.0 CVSSv3 scores. Update February 4: Cisco has updated their advisory to announce partial patches for the RV160 and RV260 Series Routers. The Solution section has been updated with this information. Background On February 2, Cisco published an…

    Read More

  • Zero trust with zero passwords – free guide explains what you need to know

    PRIVACY PRIVACY Graham Cluley Security News is sponsored this week by the folks at HYPR. Thanks to the great team there for their support! A new guide provides practical guidance for eliminating passwords to accelerate your Zero Trust strategy, and explains how Zero Trust can increase business agility. The free guide, by the analysts at…

    Read More

  • Interview with the Head of the NSA’s Research Directorate

    PRIVACY PRIVACY MIT Technology Review published an interview with Gil Herrera, the new head of the NSA’s Research Directorate. There’s a lot of talk about quantum computing, monitoring 5G networks, and the problems of big data: The math department, often in conjunction with the computer science department, helps tackle one of NSA’s most interesting problems:…

    Read More

  • Smashing Security podcast #260: New hire mystery, hacktivist ransomware, and digi-dating

    PRIVACY PRIVACY Who’s that new guy working at your company, and why don’t you recognise him from the interview? How are hacktivists raising the heat in Belarus? And should you be fully vaxxed for your online date? All this and much more is discussed in the latest edition of the award-winning “Smashing Security” podcast by…

    Read More

  • Using KPIs to generate results in Cybersecurity

    PRIVACY PRIVACY Gaining investment from business leaders to create a mature cybersecurity program and fund initiatives is an imperative for success in enterprise risk mitigation. All too often, security and IT organizations struggle to capture the attention of executives needed to advance their priorities and build even basic cybersecurity capabilities. Year after year, important initiatives…

    Read More

  • Crunch! Ransomware hits KP Nuts, Hula Hoops, and McCoys crisps

    PRIVACY PRIVACY The IT systems of KP Snacks have been hit by ransomware. And it might well impact the British public’s waistlines as well as the company’s profits: Read More

    Read More

  • Growing Number of Phish Kits Bypass MFA

    PRIVACY PRIVACY Growing Number of Phish Kits Bypass MFA Phishing kits designed to circumvent multi-factor authentication (MFA) by stealing session cookies are increasingly popular on the cybercrime underground, security researchers at Proofpoint have warned. After years of prompting by security teams and third-party experts, MFA finally appears to have reached a tipping point of user adoption. Figures…

    Read More

  • Apple AirTag and other tagging devices add to CISO worries

    PRIVACY PRIVACY We tag content, devices and our belongings. Tagging is ubiquitous today, in early 2022, but it wasn’t always the case. Stepping back into history, the late 1990s and early 2000s saw the unsavory side of competitive intelligence in Silicon Valley, with companies having their trash dumpsters siphoned for useful information, pretext calling to…

    Read More

News, Advisories and much more

Exit mobile version