News
-
UK Defense Secretary Warns Russia of Offensive Cyber Capabilities
Britain ready to hit back if attacked, says Wallace Read More
-
Why DevOps pipelines are under attack and how to fight back
In mid-2017, Russian state-sponsored attackers installed a malicious worm in a Ukrainian financial software package. When businesses updated their software, it became infected. The worm, NotPetya, spread quickly, doing billions of dollars of damage around the world. The White House called it “the most destructive and costly cyberattack in history.” Three years later, Russia-linked attackers…
-
Drop the SBOM
There’s a big movement afoot to move to an SBOM-oriented world. If you’re new to this acronym, an SBOM is a “Software Bill of Materials.” The idea is that any piece of software, or service, should come with the equivalent of an ingredients label, itemizing the component pieces of software included in the manufacture of…
-
Meyer Breach Impacts US Employees’ Personal Information
Cookware distributor was hit by cyber-attack last October Read More
-
OpenSea Phisher Stole $2m Worth of NFTs
Attack targeted customers of popular marketplace Read More
-
Teen Framed for Cybercrime Files Lawsuit
Teen sues school and Meta after being arrested and detained over cyber-threats she didn’t make Read More
-
Nurse and Marine Charged Over Fake Vaccination Card Scheme
Marine Corps reservist and nurse allegedly sold hundreds of forged coronavirus inoculation cards Read More
-
Maryland Couple Conspired to Sell Nuclear Secrets
Nuclear engineer and wife admit plot to steal restricted data and sell it to a foreign power Read More
-
FBI warns of fake CEO attacks taking place via video conferencing systems
The FBI has issued a warning that organisations should be on their guard against BEC (Business Email Compromise) attacks involving virtual meeting platforms. Read more in my article on the Hot for Security blog. Read More
-
Stealing Bicycles by Swapping QR Codes
This is a clever hack against those bike-rental kiosks: They’re stealing Citi Bikes by switching the QR scan codes on two bicycles near each other at a docking station, then waiting for an unsuspecting cyclist to try to unlock a bike with his or her smartphone app. The app doesn’t work for the rider but…