Analysis of Intellexa’s Predator Spyware - Schneier on Security
Data Safety and Information Security
What is SOAR (Security Orchestration, Automation and Response)? | Definition from TechTarget
Learn how SOAR, a collection of orchestration, automation and response technologies, helps organizations analyze, respond to and mitigate threats.
Container Security and the Importance of Secure Runtimes
Learn how container runtimes work, why tightly coupled runtimes can lead to host takeover if an attacker escapes a container, and the benefits of secure container runtimes like gVisor and Kata Containers.
MGM Hack Analysis: Security Still a Test of Your Weakest Link
This recent costly incident illustrates the need to take extra efforts to up our security game to avoid being the next devastating headline.
Don’t Let Zombie Zoom Links Drag You Down
Many organizations — including quite a few Fortune 500 firms — have exposed web links that allow anyone to initiate a Zoom video conference meeting as a valid employee. These company-specific Zoom links, which include a permanent user ID number…
The danger of target=_blank and opener | Pixelstech.net
When want to open a new page in a new tab on clicking a link on a page, the usual way of achieving this is to use target="_blank" property in a tag. However, the use of this leaves space for
BlackCat (ALPHV) ransomware linked to BlackMatter, DarkSide gangs
The Black Cat ransomware gang, also known as ALPHV, has confirmed they are former members of the notorious BlackMatter/DarkSide ransomware operation.
Colonial Pipeline ‘ransomware’ attack shows cyber vulnerabilities of U.S. energy grid
Fallout from the massive cyberattack may have regional repercussions in the Southeast if repairs drag on.
MGM, Caesars casino hacks point to an alliance of teens and ransomware gangs
Security experts worry a group of English-speaking hackers has allied itself with forces responsible for the Colonial Pipeline ransomware attack.
5 Important SIEM Reports - The List of Essential Reports
Check to learn about the five most important SIEM reports shortlisted by our experts, based on their interaction with our clients.
NIST SIEM requirements and standards - definition & overview | Sumo Logic
Explore NIST SIEM requirements and standards, and what NIST and SIEM are. Learn about How Sumo Logic can meet all your SIEM regulatory needs.
AI Image Generators: An Emerging Cybersecurity Threat
Pictures made by artificial intelligence seem like good fun, but they can be a serious security danger too. Here's how.
What to Know about Container Security and Digital Payments
Here is a guide to understanding the new PCI Guidance for Containers and Container Orchestration.
When MFA isn't actually MFA
Due to a recent Google change, MFA isn't truly MFA.
Chinese hackers have unleashed a never-before-seen Linux backdoor
SprySOCKS borrows from open source Windows malware and adds new tricks.
America’s potential Achilles’ heel in a cyber battle with China: Guam
Chinese government hacks on the island could damage American military networks and undermine the U.S. response to an invasion of Taiwan.
New vehicles a "privacy nightmare" where you consent to carmakers collecting data on behavioral, biological, even sexual activity | Boing Boing
To buy a new car in 2023 is to jump into a privacy nightmare, reports the Mozilla Foundation. The heavily-computerized and connected modern vehicles constantly collect and promiscuously share perso…
*Privacy Not Included: A Buyer’s Guide for Connected Products
All 25 car brands we researched earned our *Privacy Not Included warning label – making cars the worst category of products that we have ever reviewed
Hackers claim it only took a 10-minute phone call to shut down MGM Resorts
The ALPHV/BlackCat ransomware group claimed responsibility for the MGM Resorts cyber outage on Tuesday, according to a post by malware archive vx-underground.
Over the past few weeks, MGM and Caesars were both hacked by one of the most 'aggressive threat actors' targeting the U.S.
Caesars ended up paying tens of million of dollars to the hackers, according to sources, who asked not to be identified because the information is private.
Password-stealing Linux malware served for 3 years and no one noticed
It's not too late to check if a Linux device you use was targeted.
SBOMs, SBOMs Everywhere
Security organizations like OWASP and the OpenSSF are working to make tooling more accessible and dev-friendly to drive adoption and wider usage.
Why PayPal's global Passkey Rollout makes sense: September 2023 Update & Insights into Passkey-Readiness
This article is about the analysis of passkey-readiness and how things have changed from 2022 to 2023. Detailed real-life data that has been gathered over the past 12 months is analyzed. Findings regarding the type of passkeys (synced vs. non-synced), specific operating system and browser combinations are discussed, as well as three sample projects.
This is The Bad Space
Introducing Proof-of-Work Defense for Onion Services | Tor Project
Today, we are officially introducing a proof-of-work (PoW) defense for onion services designed to prioritize verified network traffic as a deterrent against denial of service (DoS) attacks with the release of Tor 0.4.8.
AI generated porn: A dark side of AI -
AI generated porn is one of the worst sides of the technological advancements. Just like every coin has two sides, just like everything has good as well as
Most Notorious Dark Web Hacker Attacks | Deeplab.com
Numerous well-known businesses have had hacking incidents, including NASA, T-Mobile, Dropbox, Quora, Microsoft, eBay, and others
Why is .US Being Used to Phish So Many of Us?
Domain names ending in “.US” — the top-level domain for the United States — are among the most prevalent in phishing scams, new research shows. This is noteworthy because .US is overseen by the U.S. government, which is frequently the…
What is Relationship-Based Access Control (ReBAC)? | Permit
What is Relationship Based Access Control, when should it be used, how can you implement it in your application, and how can you provide a UI for managing it?
We're Living in a Passwordless World
From passwords to passwordless — learn about how to elevate your authentication security.