Top

Category: Cybersecurity


Cybersecurity

Is Our Water Safe to Drink? Securing Our Critical Infrastructure

July 26, 2024

Via: Dark Reading

In the realm of cybersecurity risk, the obscure dark corner of the room is operational technology (OT). This is the space where computers and physical function come together, opening and closing valves, flipping breakers, stamping metal, and changing the temperature in your […]


Cloud Computing, Cybersecurity, Tech

Zest Security Aims to Resolve Cloud Risks

July 25, 2024

Via: Dark Reading

Organizations have plenty of tools to identify cloud risks, vulnerabilities, and misconfigurations, but not so much for remediating cloud risks. For most organizations, significant back-and-forth is needed between DevOps and security teams to validate the risk, understand the root cause, […]


Cybersecurity

Cybersecurity incidents disrupt services in Kentucky, Ohio

July 24, 2024

Via: StateScoop

All eight branches of the Jefferson County Clerk’s Office in Louisville, Kentucky, remain closed after a ransomware attack on Monday. The clerk’s office, responsible for issuing vehicle and voter registrations, professional licenses and housing deeds, told Spectrum News 1, which […]


Cybersecurity

Chinese APT group Daggerfly revamps malware toolkit with new backdoors

July 23, 2024

Via: CSO Online

Researchers have linked a previously unattributed Mac backdoor and a new Windows Trojan to a Chinese APT group known as Daggerfly that has been around for over a decade and targets organizations and individuals around the world. The group appears […]


Cybersecurity

Hashcat explained: How this password cracker works

July 19, 2024

Via: CSO Online

What is hashcat? Hashcat is a popular and effective password cracker widely used by both penetration testers and sysadmins, as well as criminals and spies. Cracking passwords is different from guessing a web login password, which typically allows only a […]


Cybersecurity

Iranian Cyber Threat Group Drops New Backdoor, ‘BugSleep’

July 18, 2024

Via: Dark Reading

Iranian cyber-espionage group MuddyWater is pivoting from controlling infected systems with legitimate remote-management software to instead dropping a custom-made backdoor implant. As recently as April, the group infected systems by targeting Internet-exposed servers or through spear phishing, ending with the […]


Cybersecurity

Disney suffers massive internal communications data leak after cyberattack

July 16, 2024

Via: CSO Online

Walt Disney’s internal communications on Slack have been leaked online, exposing sensitive details about ad campaigns, studio technology, and interview candidates, according to a Wall Street Journal report. The hacker group NullBulge claimed responsibility, stating in a blog post that they […]


Cybersecurity

AT&T’s massive breach of metadata is a criminal treasure trove — as spy agencies know

July 15, 2024

Via: CSO Online

There is plenty of intelligence that can be gathered from call data records if you know where to look. Spy agencies have been doing it effectively for years. Last week we learned via an SEC 8K filing that data has […]


Cybersecurity

6 tips for consolidating your IT security tool set

July 11, 2024

Via: CSO Online

Spending sprees, acquisitions, siloed departments, and escalating security concerns have many CISOs drowning in security solutions. Here’s how to rein in the tool sprawl and ensure enhanced security as you streamline your security stack. Organizations have been on a spending […]


Cybersecurity

Evolve data breach impacted upward of 7.64 million consumers

July 10, 2024

Via: CSO Online

Ransomware attack saw LockBit group access and download critical customer information. The number of persons affected by a recent data breach at Evolve Bank & Trust exceeds 7.64 million, a document submitted to the Office of the Maine Attorney General this week […]


Cybersecurity

Legacy systems are the Achilles’ heel of critical infrastructure cybersecurity

July 8, 2024

Via: CSO Online

China and other nation-state bad actors are probing the defenses of critical infrastructure worldwide and legacy or outdated systems are prime targets. The time to mitigate that risk is now. Rare is the element of critical infrastructure ecosystem that doesn’t […]


Cybersecurity

Understanding APIs and how attackers abuse them to steal data

June 24, 2024

Via: CSO Online

Properly securing APIs will help your organization defend against cyberattacks, drive operational efficiencies, satisfy audit and compliance requirements and enable innovation. Simply put, APIs (short for application programming interface) are how machines, cloud workloads, automation and other non-human entities communicate […]


Cybersecurity, Federal, Policy

US bans Kaspersky Labs over national security concerns

June 21, 2024

Via: CSO Online

The popular antivirus software vendor will be prohibited from selling its software within the US or providing updates to software already in use. The Biden administration has reached a decision to block all new sales of Kaspersky Labs’ products and […]


Cybersecurity

How Cybersecurity Can Steer Organizations Toward Sustainability

June 19, 2024

Via: Dark Reading

Inadequate cybersecurity architecture can cause irreparable damage to an organization, which is why boards and C-suite executives are heeding recommendations to implement policies and procedures to mitigate risk. In addition, boardrooms are also paying attention to other hot topics, including […]


Cybersecurity

Three ways AI is raising the stakes around endpoint security

June 18, 2024

Via: CIO

Over the last few years, AI adoption has grown exponentially. But with it comes a number of risks around endpoint security. Learn what they are and how you can protect against these new threats. AI has made endpoint security even […]


Cybersecurity

What Is a Zero-Trust Network and How Does it Work?

June 14, 2024

Via: InformationWeek

A zero-trust network is true to its namesake: zero trust. Zero-trust networks provide continuous authentication of users and activities on the network. This is in contrast to what traditional network authorization schemes do: authenticate users once, at the time that they initially […]


Cybersecurity, Hardware & Software, Tech

Nvidia Patches High-Severity Flaws in GPU Drivers

June 13, 2024

Via: Dark Reading

Nvidia has issued 10 security alerts detailing vulnerabilities in the company’s GPU drivers and virtualization software. The vulnerabilities, if successfully exploited, could allow attackers to steal or tamper with data, execute arbitrary code, or take control of programs, the company […]


Cybersecurity

China state hackers infected 20,000 Fortinet VPNs, Dutch spy service says

June 12, 2024

Via: ArsTechnica

Hackers working for the Chinese government gained access to more than 20,000 VPN appliances sold by Fortinet using a critical vulnerability that the company failed to disclose for two weeks after fixing it, Netherlands government officials said. The vulnerability, tracked […]


Cybersecurity

Making Choices for Stronger Vulnerability Management

June 10, 2024

Via: Dark Reading

According to Coalition’s research, Common Vulnerabilities and Exposures (CVEs) are expected to increase by 25% in 2024 to a shocking height of 34,888 vulnerabilities, or roughly 2,900 per month. As attack surfaces continue to expand rapidly, business leaders face mission-critical […]


Cybersecurity

Arctic Wolf sniffs out new ransomware variant

June 5, 2024

Via: CSO Online

The ransomware payload is designed for an easy and quicker payday over a deep, double-extortive infection. Arctic Wolf’s incident response team has identified a new ransomware variant, referred to as Fog — targeting the education and recreation sectors in the […]