Threats & Malware, Virus & Malware
December 26, 2023
Via: Security AffairsResecurity, a Los Angeles-based cybersecurity company protecting Fortune 100 and government agencies worldwide, has compiled a comprehensive forecast outlining the imminent threats and novel security challenges anticipated in the upcoming year. These projections stem from an in-depth analysis of the […]
December 18, 2023
Via: Help Net SecurityAt its core, encryption involves the use of algorithms, mathematical functions that manipulate data into a seemingly random and indecipherable form. This encoded information, referred to as ciphertext, can only be converted back into its original, meaningful state by those […]
December 18, 2023
Via: The RegisterThe National Grid is reportedly the latest organization in the UK to begin pulling China-manufactured equipment from its network over cybersecurity fears. The contract with the UK subsidiary of China’s state-owned Nari Technology, NR Electric UK, was terminated after seeking […]
December 14, 2023
Via: The RegisterWhether you are considering a career in cyber security or you already work in the industry, the 2023 SANS Holiday Hack Challenge is a great way of combining festive fun and learning. Who knows, the skills you acquire this holiday […]
December 14, 2023
Via: The RegisterKarakurt, a particularly nasty extortion gang that uses “extensive harassment” to pressure victims into handing over millions of dollars in ransom payments after compromising their IT infrastructure, pose a “significant challenge” for network defenders, we’re told. This is largely because […]
December 12, 2023
Via: The RegisterThere was only one US Air National Guardsman behind the leak of top-secret US military documents on Discord, but his chain of command bears some responsibility for letting it happen on their watch. The US Air Force reached that conclusion […]
December 12, 2023
Via: SecureWorldMore than a few federal agencies have some work to do when it comes to incident response, according to a December 4, 2023, report from the U.S. Government Accountability Office (GAO), titled “Cybersecurity: Federal Agencies Made Progress, but Need to […]
December 11, 2023
Via: The RegisterThe saga of 23andMe’s mega data breach has reached something of a conclusion, with the company saying its probe has determined millions of leaked records originated from illicit break-ins into just 14,000 accounts. In an update on Tuesday to a […]
December 7, 2023
Via: SecureWorldAs the year comes to an end, it’s time to look into the crystal ball. Here is my list of the top four cyber security issues for 2024. Generative AI For cyber defenders, AI will increasingly be used to identify […]
December 7, 2023
Via: SecureWorldNew revelations have shed light on the extensive fallout of the 23andMe data breach, which has exposed the personal information of a staggering 6.9 million users. This significant update comes almost two months after the genetic testing company initially reported […]
Threats & Malware, Vulnerabilities
December 6, 2023
Via: The RegisterA security vulnerability previously added to CISA’s Known Exploited Vulnerability catalog (KEV), which was recognized by CVE Numbering Authorities (CNA), and included in reputable threat reports is now being formally rejected by infosec organizations. CISA removed CVE-2022-28958 from its KEV […]
December 4, 2023
Via: Help Net SecurityA cybersecurity budget is an allocation of resources, both financial and otherwise, dedicated to protecting an organization’s digital assets from cyber threats. This includes funds for security software, hardware, training, and personnel. A well-structured cybersecurity budget ensures that an organization […]
December 1, 2023
Via: The RegisterMeta and Google have disclosed what they allege are offensive cyber ops conducted by China. The Social Network™ used its Quarterly Adversarial Threat Report [PDF], published Thursday, to report it booted 4,789 Facebook accounts for violating its policy against coordinated […]
Application security, Security
November 29, 2023
Via: The RegisterReading Borough Council has securely restored its planning portal after facing criticism for recommending questionable tech security practices to users. Before the fixed version went live this morning, the English local authority’s online planning application portal had been offline due […]
Application security, Security
November 28, 2023
Via: SecureWorldIn the ever-evolving landscape of computer security, many innovations flood the market, each boasting its efficacy. As a regular attendee of security conferences and contributor to security books, it’s evident to me that the field remains a hot topic. However, […]
November 21, 2023
Via: SecurelistAt Kaspersky, we constantly monitor the financial cyberthreat landscape, which includes threats to financial institutions, such as banks, and financially motivated threats, such as ransomware, that target a broader range of industries. As part of our Kaspersky Security Bulletin, we […]
November 17, 2023
Via: The RegisterThe UK division of Samsung Electronics has allegedly alerted customers of a year-long data security breach – the third such incident the South Korean giant has experienced around the world in the past two years. An email to customers, shared […]
November 17, 2023
Via: SecureWorldThe United States National Security Agency (NSA) has raised concerns about Chinese government-backed hackers embedding themselves within U.S. critical infrastructure networks, posing a significant threat to the nation’s security and economic stability. These hackers, operating under the moniker “Volt Typhoon,” […]
Application security, Security
November 16, 2023
Via: SecureWorldIn a significant move to harness the power of artificial intelligence (AI) for enhanced cybersecurity, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) has unveiled its “2023-2024 CISA Roadmap for Artificial Intelligence.” The comprehensive plan, released this month, outlines CISA’s […]
November 14, 2023
Via: SecurityWeekWeld Pond: hacker Is he a hacker? “Absolutely,” he says. “A hacker is someone who wants to understand how a system works, and then explore how that system can be manipulated to do something unintended by the developer. The interesting […]