Advertisement

Email encryption  >  An encrypted binary 'at' symbol with a keyhole.

AWS releases Wickr, its encrypted messaging service for enterprises

The release of the enterprise version of the encrypted messaging service, announced at AWS re:Invent, is designed to allow secure collaboration across messaging, voice, video and file sharing.


malicious email with skull and crossbones

Website offering spoofing services taken offline after joint operation

Law enforcement authorities in Europe, Australia and North America have arrested 142 people in connection with a website that allowed criminals to steal $120 million from victims that had fallen foul of spoofing campaigns.


European Union, EU

EU Council adopts NIS2 directive to harmonize cybersecurity across member states

The NIS2 directive replaces NIS as EU Council seeks to improve resilience and incident response capacities in the EU.


Advertisement

WhatsApp secure messaging on a mobile phone

500 million WhatsApp mobile numbers up for sale on the dark web

The seller claims to have data of users from over 84 countries, including US, UK, India, Egypt, Mexico and Russia.


Hacking stealing password data

Here is why you should have Cobalt Strike detection in place

Abusing variants of legitimate penetration testing tools has become a standard tactic for many attackers seeking to fool security teams. Cobalt Strike is among the attack frameworks used by red teams and cyber specialists should be on...


A circuit key at the center of a system of integrated security: endpoints/devices/networks/apps/etc.

Top 7 CIAM tools

Customer identity and access management (CIAM) is the basis to improve management and control of third parties’ access to a business. Here are the top seven CIAM tools currently in the market.


credit card theft / credit card fraud / credit card hack

Cybercriminals are increasingly using info-stealing malware to target victims

In the first seven months of this year, threat actors stole over 50 million passwords, 2 billion cookie files, details of 103,150 bank cards, and data from 113,204 crypto wallets. 


big data merger and acquisition big business smb

Top cybersecurity M&A deals for 2022

The hot cybersecurity mergers and acquisition market continues into 2022 as vendors look to solidify their positions and expand their offerings.


malvertising malware hacked ads advertising online

DUCKTAIL malware campaign targeting Facebook business and ads accounts is back

The spear phishing group has revised its tactics and is employing more sophisticated techniques and tactics based on what appears to be extensive research into Facebook business and ads management accounts.


security system vulnerabilities - a grid of locks with several unlocked

EPSS explained: How does it compare to CVSS?

The Exploit Prediction Scoring System has its shortcomings, but it can complement CVSS to help better prioritize and assess vulnerability risk.


Advertisement

Social engineering  >  Laptop user with horns manipulates many social media accounts

Meta outlines US involvement in social media disinformation in new report

The social media giant’s latest quarterly adversarial threat report describes three coordinated disinformation networks, one of which appears to originate from the US.


joe biden cyberceomeeting public domain wh

The Biden administration has racked up a host of cybersecurity accomplishments

The Biden administration’s intense focus on cybersecurity has resulted in an unprecedented number of initiatives. Although domestic efforts seem well-baked, opportunities exist for further leadership in the international arena.


uk and south korea flags

UK finalizes first independent post-Brexit data transfer deal with South Korea

UK organizations will be able to securely transfer personal data to the Republic of Korea without restrictions by the end of 2022.


targeted holiday attacks  >  a red bow impaled by a hook, surrounded by abstract binary code

Online retailers should prepare for a holiday season spike in bot-operated attacks

On the naughty list this year are a host of bad actors employing a huge variety of different bot attacks that can have a big impact on retail websites. Fortunately, there are steps cybersecurity professionals can take to mitigate the...


A digital hub marked with crossed wrench and screwdriver branches circuits through a system.

How to reset a Kerberos password and get ahead of coming updates

If you haven’t already, now is the time to reset your Kerberos password — take proactive action to ensure that you are one step ahead and prepared nearly a year in advance of future hardening.