Advertisement

post 12 image three ways that security in the azure cloud just got simpler

Researchers found security pitfalls in IBM’s cloud infrastructure

A demonstrated attack by cybersecurity researchers in IBM’s cloud infrastructure allowed them access to the internal server used to build database images for customer deployments.


Binary chain links of data  >  Blockchain / blockchain security / linked elements

Software projects face supply chain security risk due to insecure artifact downloads via GitHub Actions

Cybersecurity researchers found risks in the GitHub Actions platform that could enable attackers to inject malicious code into software projects and initiate a supply chain attack.


manager scanning workforce data via antimalware picture id1022805724

8 things to consider amid cybersecurity vendor layoffs

Cybersecurity vendor layoffs raise several issues for CISOs and customers, not the least of which are security and risk-related factors. Here are 8 things to consider if your security vendor has announced significant staff cuts.


Advertisement

4 encryption keys

Fortanix unveils AWS integration for centralized key management

Multicloud users have a new option for encryption key management across platforms, with the news that Fortanix has now integrated AWS support.


10 cloud security breach virtualization wireless

AWS' Inspector offers vulnerability management for Lambda serverless functions

AWS announces new cybersecurity features in Amazon Inspector and Amazon Macie at AWS Re:Invent 2022 in Las Vegas.


padlock domain name system dns security data center lock icann

AWS launches new cybersecurity service Amazon Security Lake

The service automatically centralizes security data from cloud and on-premises sources into a purpose-built data lake in a customer’s AWS account.


A ladder extends into clouds in the sky. [ growth /expansion / opportunity / growth ]

5 top qualities you need to become a next-gen CISO

The world of cybersecurity changes quickly. If you want to be at the top of your game, a next-generation (“next-gen” in IT-speak) CISO, you should consider these guidelines for building and maintaining the skills and relationships...


Ransomware  >  A coin-operated lock ransoming an encrypted system.

What is Ransom Cartel? A ransomware gang focused on reputational damage

The group combines data encryption with data theft and threatens to release stolen information on their website. But Ransom Cartel ups its game by threatening to send sensitive information to victim’s partners, competitors, and news...


social media - collaboration tools - communication

How to build a public profile as a cybersecurity pro

High-profile cybersecurity professionals share their paths, tips, and learnings for those interested in creating a personal brand.


A graph with abstract rates and values sharply declines. [losses / crisis / crash]

Financial services increasingly targeted for API-based cyberattacks

API-based attacks are sharply on the rise, as cybercriminals take aim at the financial services industry, according to a new report from Akamai.


Advertisement

Email encryption  >  An encrypted binary 'at' symbol with a keyhole.

AWS releases Wickr, its encrypted messaging service for enterprises

The release of the enterprise version of the encrypted messaging service, announced at AWS re:Invent, is designed to allow secure collaboration across messaging, voice, video and file sharing.


malicious email with skull and crossbones

Website offering spoofing services taken offline after joint operation

Law enforcement authorities in Europe, Australia and North America have arrested 142 people in connection with a website that allowed criminals to steal $120 million from victims that had fallen foul of spoofing campaigns.


European Union, EU

EU Council adopts NIS2 directive to harmonize cybersecurity across member states

The NIS2 directive replaces NIS as EU Council seeks to improve resilience and incident response capacities in the EU.


WhatsApp secure messaging on a mobile phone

500 million WhatsApp mobile numbers up for sale on the dark web

The seller claims to have data of users from over 84 countries, including US, UK, India, Egypt, Mexico and Russia.


Hacking stealing password data

Here is why you should have Cobalt Strike detection in place

Abusing variants of legitimate penetration testing tools has become a standard tactic for many attackers seeking to fool security teams. Cobalt Strike is among the attack frameworks used by red teams and cyber specialists should be on...