Malware-Infested Smart Card Reader
Brian Krebs has an interesting story of a smart ID card reader with a malware-infested Windows driver, and US government employees who inadvertently buy and...
USN-5447-1: logrotate vulnerability
It was discovered that logrotate incorrectly handled the state file. A local attacker could possibly use this issue to keep a lock on the state...
18 Oil and Gas Companies Take Cyber Resilience Pledge
Energy corporations agree to cooperate on cybersecurity amid surging attacks on the sector Read More
USN-5446-1: dpkg vulnerability
Max Justicz discovered that dpkg incorrectly handled unpacking certain source packages. If a user or an automated system were tricked into unpacking a specially crafted...
Mastercard expands cybersecurity, risk services with new attack simulation and assessment platform
Financial services giant Mastercard has announced the launch of a new attack simulation and assessment platform designed to help businesses and governments enhance their cybersecurity...
Multi-Continental Operation Leads to Arrest of Cybercrime Gang Leader
The 37-year-old man is alleged to have spearheaded major phishing campaigns and business email compromise schemes Read More
Three-quarters of Security Pros Believe Current Cybersecurity Strategies Will Shortly Be Obsolete
New research shows companies are falling behind when it comes to developing strategies to protect themselves against cyber-attacks Read More
7 top privileged access management tools
One of the main objectives of the bad guys is to escalate to privileged account access wherever possible. The more unfettered access they can gain...
Remote bricking of Ukrainian tractors raises agriculture security concerns
Against the backdrop of horrific reports from Russia's Ukraine invasion, an encouraging story emerged earlier this month when unidentified Ukrainians remotely disabled tractors worth $5...
State of Cybersecurity Report 2022 Names Ransomware and Nation-State Attacks As Biggest Threats
Ransomware, nation-state attacks, and supply chains were cited as the biggest threats in the Infosecurity Group's annual report Read More