News

Google Cloud
security monitoring

DDOS attack

Russian DDoS attack on Lithuania was planned on Telegram, Flashpoint says

Russian cybercollective Killnet dropped evidence of possible collaboration with ransomware gang Conti in its hacking campaign against Lithuania on a Telegram channel, security company Flashpoint reports.

Cyber warfare  >  Russian missile launcher / Russian flag / binary code

Microsoft's Defending Ukraine report offers fresh details on digital conflict and disinformation

Russia will use what it learned from its destructive cyber actions in Ukraine for other operations. "There is no going back to normal."

security monitoring

Security startup Cerby debuts with platform to manage shadow IT

The Cerby system automates and streamlines the detection and protection of "unmanageable" applications, providing a platform that centralizes application enrollment, access and monitoring.

ransomware breach hackers dark web

5 years after NotPetya: Lessons learned

NotPetya vastly broadened the scope of damage that malware attacks could do and forced CISOs and security researchers to rethink their approach.

lawsuit judge law court decision sued

After business email compromise, tribunal forces ACT company to pay debt, again

As fraud surges, companies are reminded to tighten email filtering and financial controls to not find themselves in a situation where they have to pay twice for goods acquired only once.

Impersonation / disguise / fraud / false identity / identity theft

Mitek launches MiVIP platform to fight identity theft

The Mitek Verified Identity Platform can leverage multiple authentication technologies to provide security across the transaction lifecycle.

spyware alert notification

Italian spyware firm is hacking into iOS and Android devices, Google says

RCS Lab spyware uses known exploits to install harmful payloads and steal private user data, according to a Google report.

A hand controls a small marionette. [control / manipulation / social engineering]

5 social engineering assumptions that are wrong

Cybercriminals continue to launch creative social engineering attacks to trick users. Meanwhile, social engineering misconceptions are exacerbating the risks of falling victim.

noops code developer devops html web developer by mazimusnd getty

Open-source software risks persist, according to new reports

Companies are still struggling to gain confidence in the security of their open-source projects, but shifting security earlier in the development process shows promise.

handshake

Kaseya closes $6.2 billion Datto deal, vows to cut prices

The IT services software provider promises lower costs for consumers, tight integration between the two companies’ products.

cisco logo fit

Cisco reports vulnerabilities in products including email and web manager

New vulnerabilities found in Cisco internal testing allow remote access and scripting that could lead to the loss of sensitive user data.

10 cloud security breach virtualization wireless

Palo Alto adds out-of-band web application security features to Prisma Cloud

Vendor says new updates will help organizations better monitor and secure web applications without impacting performance.

Industry 4.0 / Industrial IoT / Smart Factory / Tablet control of robotics automation.

Dozens of insecure-by-design flaws found in OT products

The OT:ICEFALL report shows that makers of operational technology manufacturers have to improve the security of their devices.

Industry 4.0 / Industrial IoT / Smart Factory

Microsoft includes IoT devices under its Secured-core program

The Edge Secured-core, program is designed to validate IoT devices for specific security hardware technology, and ensure users that they are running an OS with built-in security technology.

A multitude of arrows pierce a target. [numerous attacks / quantity / severity]

APT actor ToddyCat hits government and military targets in Europe and Asia

The previously undocumented APT group has been targeting high-profile organizations in Asia and Europe for over a year.

ransomware hack

Cato Networks offers new capability for network-based ransomware protection

New machine learning algorithms scan server traffic to detect and eliminate ransomware attacks across Cato's customer network.

1 network internet connected grid earth power satellite view

Space-based assets aren’t immune to cyberattacks

Russia's attack on Viasat satellites exposed how vulnerable space-based assets are and the potential for spillover damage.

data securitylock picture id1204583789

Dark web markets are hungry for Australian identity data

Demand for personal information from Australians are fed by breaches like the recent massive compromise of NDIS supplier

Load More