

The Hacker News
Why Defenders Should Embrace a Hacker Mindset
Prioritizing cybersecurity is key. Learn how to prioritize remediation based on impact and protect your organization's crown jewels.
The Hacker News
Prioritizing cybersecurity is key. Learn how to prioritize remediation based on impact and protect your organization's crown jewels.
CyberNews
Cybernews asked more than 30 experts from various fields if they’d be willing to pay a ransom in the event of a cybersecurity breach.
Infosecurity News
IBM found Gootloader group opting for GootBot over off-the-shelf tools for lateral movement
SecurityWeek
Redmond's new security initiative promises faster patches, better management of signing keys and products with a higher default security bar.
The Hacker News
IoT adoption is on the rise, but it comes with risks. Explore the challenges and opportunities of seamlessly integrating IoT into your business while
The Record
Ukrainian officials speak with the Click Here podcast team about something they previously kept close to the vest: Their country's hunt forward operations with personnel from U.S. Cyber Command.
DarkReading
Ongoing Rapid Reset DDoS flood attacks exposed organizations need to patch CVE-2023-44487 immediately to head off crippling outages and business disruption.
SecurityWeek
Zero Trust Network Access (ZTNA) solutions help minimize attack surfaces while ensuring productivity and security of remote workers
Infosecurity News
The Trend Micro report observed that small organizations are being increasingly targeted by ransomware gangs, including LockBit and BlackCat
Bleeping Computer
Training end-users to spot phishing has its benefits, but it's clear to see organizations as a whole have failed to make a dent in phishing attacks. Learn more from Specops Software on how phishers use social engineering to exploit human psychology.
CyberSecurity Dive
Understanding model limitations and keeping humans in the loop is critical to productive adoption of AI, according to several software leaders.
SecurityWeek
Join Cloudflare and SecurityWeek for a webinar to discuss “VPN Replacement: Other ZTNA Superpowers CISOs Should Know”
Trend Micro
Ed Cabrera, former CISO of the US Secret Service and current Chief Cybersecurity Officer for Trend Micro, explains why Federal agencies are slow to comply with Biden's cybersecurity executive order.
DarkReading
Both threats to enterprises and career opportunities are being created by the escalation of generative AI and ChatGPT, warns Maria 'Azeria' Markstedter.
Ars Technica
With no skill in software exploitation or encryption busting, Lapsus$ wins anyway.
CyberSecurity Dive
By reorienting systems defense around resilience, “we become more like attackers, we become nimble, empirical, curious,” Kelly Shortridge said at Black Hat USA 2023.
Trend Micro
Discover the core principles and frameworks of Zero Trust, NIST 800-207 guidelines, and best practices when implementing CISA’s Zero Trust Maturity Model.
The Record
Ransomware attacks targeting Finnish organizations have increased four-fold since the Nordic country began the process of joining NATO last year, according to a senior official.
DarkReading
While cybersecurity preparedness in Africa is on the upswing, the continent still lacks agreements on international security standards and sharing threat intel.
CyberSecurity Dive
The change in security leadership comes months after the third-party cloud storage service GoTo shares with LastPass was breached.
The Record
A spokesperson told Recorded Future News that the EPA is committed to the new rule as part of its mission to protect the public.
Security Affairs
Resecurity identified the emergence of adversarial mobile Android-based Antidetect Tooling for Mobile OS-Based Fraud. Resecurity has identified the emergence of adversarial mobile Android-based tools (called “mobile anti-detects”), like Enclave and McFly, as a new frontier in fraud tradecraft evolution. These tools are used by criminals involved in online-banking theft to impersonate compromised account holders and […]
The Record
Lt. Gen. Timothy Haugh has a long history with cyber operations in the Air Force and at Cyber Command. Insiders say he has what it takes to follow Gen. Paul Nakasone atop CYBERCOM and the NSA.
The Record
An interview with Christian-Marc Lifländer, the head of NATO's cyber and hybrid policy section, about NATO’s changing approach to cyber, and what will happen if attacks targeting Western states continue to increase.
CyberSecurity Dive
Generative AI can become an ally for new security professionals who may otherwise feel overwhelmed. For more seasoned security analysts, it can offer time to refine their skills through automation of repetitive tasks.
Trend Micro
In today's business world's dynamic and ever-changing digital landscape, organizations encounter escalating security challenges that demand a more business-friendly and pertinent approach.
Trend Micro
In this article, we will explore how Zero Trust can benefit your organization, focusing on its ability to enhance security, secure supply chains, and align with international regulatory frameworks.
Trend Micro
In this blog post, we discuss different configuration scenarios that may lead to security issues with Azure Service Fabric, a distributed platform for deploying, managing, and scaling microservices and container applications.
Infosecurity News
With Infosecurity Europe just around the corner, here are four of the must-see activities happening at this year’s event
ZDNet
Remote and hybrid working is here to stay: the focus going forward is on fine-tuning and optimizing these new work practices.
Bleeping Computer
In some ways, past best practices for password policies may have made password cracking easier. Let's examine the most common types of password attacks, and how to defend against them.
Infosecurity News
Alert fatigue is a major issue, says Expel
Infosecurity News
UK government survey finds they are prioritizing other things
CyberSecurity Dive
The global effort to promote secure by design is seen as a potential game changer for software security, but may require substantial investments and considerable cultural changes.
Cyber Security News
Many CEOs still believe that data breaches only happen to other companies. This mindset can lead to complacency, leaving your organization vulnerable to cyber-attacks.
CSO
Around 50% of CISOs are expected to change jobs by 2025, according to a Gartner study that found the cybersecurity leader’s job is becoming more stressful.
CSO
Thanks to the availability of malware such as Emotet, deploying backdoors on victims' networks is becoming easier and more lucrative for cybercriminals.
CyberSecurity Dive
Organizations must plan ahead and invest in people and resources to succeed with zero trust, writes Gartner analyst John Watts.
The Hacker News
Think you're protected from cyber attacks? Hackers are always finding new ways to exploit vulnerabilities. Learn to think like a hacker and stay ahead
CyberSecurity Dive
Successful law enforcement actions against ransomware can only do so much. The threat is omnipresent, lucrative and largely in the shadows.
The Hacker News
Stay ahead of the game with top-notch cybersecurity measures. The attacks may be becoming more severe, but so are our defenses.
Bleeping Computer
Hackers have leveraged a critical remote code execution vulnerability in Realtek Jungle SDK 134 million attacks trying to infect smart devices in the second half of 2022.
Bleeping Computer
Hackers have leveraged a critical remote code execution vulnerability in Realtek Jungle SDK 134 million attacks trying to infect smart devices in the second half of 2022.
Cyber Security News
Best Zero Trust Security Vendors & Solutions - 1. Perimeter 81, 2. CrowdStrike Zero Trust, 3. Cisco Zero Trust, 4. Palo Alto 5. Akamai
Infosecurity News
The World Economic Forum launched its latest cybersecurity report, the Global Cybersecurity Outlook 2023
Trend Micro
Running real-world attack simulations can help improve organizations' cybersecurity resilience
Naked Security
Listen now – you’ll be alarmed, amused and educated, all in equal measure. (Full transcript in article.)
ZDNet
From hobbyist hackers and programmers to professionals, they will love our picks for tech gifts for hackers this holiday season.
CyberSecurity Dive
Fears of the next SolarWinds or Log4j-style incident hitting over the holidays have some cybersecurity experts on edge.
CSO
Verica Open Incident Database Report suggests mean time to resolve should be retired and replaced with other metrics more appropriate for software systems and networks.
SecurityWeek
SecurityWeek's 2022 Security Operations Summit is an immersive online event that will offer insights and strategies to maximize the efficiency of enterprise security operations centers (SOCs).
The Hacker News
Coding best practices have continued to evolve over the years, in response to business needs and market trends.
DarkReading
New users and monetization methods are increasingly profitable for gaming industry, but many companies find they have to stem growth in cheats, hacks, and other fraud to keep customers loyal.
The Record
The Yanluowang ransomware group finds itself the victim of a leak.
The Record
Washington and the tech world have been talking about public private partnerships in cyberspace for decades. The NSA and Cyber Command have intelligence about attacks; cybersecurity companies have the means to block them. It looks like they are finally working together — not in the U.S, but in Ukraine.
SecurityWeek
Iranian government-sponsored APT actors hacked into at least one Federal Civilian Executive Branch (FCEB) organization with an exploit for a Log4j vulnerability in an unpatched VMware Horizon server.
CSO
Meta researchers say their Online Operations Kill Chain framework offers a common taxonomy to understand the threat landscape and spot vulnerabilities.
ZDNet
From hobbyist hackers and programmers to professionals, they will love our picks for tech gifts for hackers this holiday season.
ZDNet
From hobbyist hackers and programmers to professionals, they will love our picks for tech gifts for hackers this holiday season.
CyberScoop
The former CrowdStrike executive and co-founder of Silverado Policy Accelerator says Americans need to understand Taiwan's strategic value.
CyberSecurity Dive
No one is perfect, and that includes your IT professionals. Here's what security experts say could help mitigate human error.
Infosecurity News
Cyber-criminals could use the leaked source code to help launch attacks
SecurityWeek
Firmware and hardware security company Eclypsium has raised $25 million in Series B funding, which brings the total invested in the firm to $50 million.
SecurityWeek
A discussion on the state of cybersecurity investments, venture capital strategies in a confusing economic climate, predictions on hot and not-so-hot product categories, and what happens with all those cybersecurity unicorns.
Security Affairs
nuvola is the new open-source cloud security tool to address the privilege escalation in cloud environments. nuvola is the new open source security tool made by the Italian cyber security researcher Edoardo Rosa (@notdodo), Security Engineer at Prima Assicurazioni. The tool was released during the RomHack 2022 security conference in Rome. The tool helps the […]
SecurityWeek
By understanding current ROI it is easier to justify future cost because you know the value. But this is a problem: how do you measure or quantify ROI in cybersecurity spend?
Ars Technica
“I announce I am a hacker and Uber has suffered a data breach,” intruder says on Slack.
SecurityWeek
Industry professionals comment on the new guidance from the US government asking for security guarantees from software vendors.
CyberSecurity Dive
Modern systems and modes of attack demand a dynamic and realistic security strategy, Shawn Bice said. The problem can be managed, not solved.
Infosecurity News
ISACA's State of Digital Trust 2022 report highlights increasing importance of digital trust across businesses
SecurityWeek
Israeli startup Opus Security has banked $10 million in seed round funding to build technology for cloud security orchestration and remediation.
Security Affairs
In the digital age, authentication is paramount to a strong security strategy. Which are the challenges of user authentication? In the digital age, authentication is paramount to a strong security strategy. As virtually every aspect of day-to-day life and business is conducted online, the added convenience has also brought added risk. Information privacy, data sovereignty, […]
CyberSecurity Dive
CISOs are up against talent shortages and retention concerns amid an increasingly sophisticated threat landscape.
DarkReading
The phishing-as-a-service offering targets accounts from tech giants, and also has connections to PyPI phishing and the Twilio supply chain attack.
The Hacker News
SecDevOps translates into a more secure environment over the entire lifecycle of a system.
The Hacker News
Using instructor-led training, e-learning, hands-on labs, and gamification, Cydrill offers a novel and effective way to learn how to code securely.
CyberSecurity Dive
Despite phishing attacks that evaded authentication and engulfed many technology companies of late, organizations shouldn’t hesitate to use MFA.
CyberSecurity Dive
The enterprise messaging platform has faced increased customer concerns about security and privacy.
Infosecurity News
The company said it will proceed to restore its systems as soon as they are sanitized
Trend Micro
While DevOps practitioners use environment variables to regularly keep secrets in applications, these could be conveniently abused by cybercriminals for their malicious activities, as our analysis shows.
Ars Technica
Think you're too smart to be fooled by a phisher? Think again.
ThreatPost
This edition of the Threatpost podcast is sponsored by Egress.
The Hacker News
Security awareness training gives companies the confidence that their employees will execute the right response.
CyberSecurity Dive
The cybersecurity vendor has yet to disclose how the incident occurred, the type of data stolen and if ransomware was involved.
CyberSecurity Dive
Cybersecurity professionals are confronting a chronic vulnerability-patch cycle and the situation is getting worse.
Trend Micro
We discovered the use of two Python penetration-testing tools, Impacket and Responder, that malicious actors used to compromise systems and exfiltrate data. We share our key findings in this report.
Infosecurity News
Food manufacturer reveals system outage
DarkReading
Organizations that can break out of siloed data and apply context can transform intelligence into actionable, relevant security knowledge.
ThreatPost
Rob Gurzeev, CEO and Co-Founder of CyCognito, explores external attack surface soft spots tied to an ever-expanding number of digital assets companies too often struggle to keep track of and manage effectively.
Infosecurity News
10 companies will experiment on the Morello board as part of the government-backed DSbD initiative
SecurityWeek
Cybersecurity and technology investment firm Paladin Capital Group has closed its Cyber Fund II with over $370 million.
SecurityWeek
While neurodiverse candidates don’t fit the traditional mold of applicants in the cybersecurity industry, they can often excel at highly focused, analytical work
DarkReading
New funding led by global cyber investor Paladin Capital Group, alongside existing investors Columbia Capital and Skylab Capital.
Trend Micro
Trend Micro’s Managed XDR team addressed a Kingminer botnet attack conducted through an SQL exploit. We discuss our findings and analysis in this report.
SecurityWeek
Join the webinar to understand how “blast radius”, “risk amplification” and vulnerabilities unique to hosts can help you prioritize risks in your cloud and speed up your remediation strategies.
SecurityWeek
For providers of DevSecOps services and solutions, the focus should be on removing friction from integrating security and helping teams come together to make security everyone’s responsibility.
ThreatPost
How to use zero-trust architecture effectively in today's modern cloud-dependent infrastructures.
Computerworld
Zero trust is not just for cybersecurity specialists — it’s the new necessary way of life for business.
Cyber Security News
In this article we discuss the safety and security concerns of crypto trading bots. Read on to find out how safe crypto trading bots are.
CyberSecurity Dive
The FIDO Alliance is pushing for smartphones to become the authentication standard as the tech industry presses for new methods.
CSO
Customization, multi-factor authentication are key features in PCI DSS v4.0 global payment benchmark.
CSO
Customization, multi-factor authentication are key features in PCI DSS v4.0 global payment benchmark.
ZDNet
Does the US government's reliance on Microsoft Office 365 make it more vulnerable to cyberattacks? Google Cloud says that's what its survey shows.
ThreatPost
A bug in Honda is indicative of the sprawling car-attack surface that could give cyberattackers easy access to victims, as global use of ‘smart car tech’ and EVs surges.
Bleeping Computer
A Wyze Cam internet camera vulnerability allows unauthenticated, remote access to videos and images stored on local memory cards and has remained unfixed for almost three years.
Infosecurity News
Privacy & cybersecurity attorney, Leeza Garber, highlights the importance of hiring for behaviors in cybersecurity
SecurityWeek
Contrary to what some vendors may imply, zero trust is not a "one and done" type project. It's a journey to improve your overall security posture using zero-trust principles.
ZDNet
Some 97% of organisations across seven Asia-Pacific markets, including Singapore and Australia, recognise the need to train their employees in digital skillsets, with cloud and cybersecurity the top-most in demand, but just 29% have implemented plans to do so.
The Hacker News
The Golden Hour of Incident Response
The Hacker News
The Definitive 2021 Security Plan PPT template enables security pros to easily distill their security knowledge and present the insights.
The Hacker News
Why Enterprise Threat Mitigation Requires Automated, Single-Purpose Tools
SecurityWeek
The evolution of cybersecurity incident response and the modern SOC continues to be one of the biggest post-pandemic security trends
ZDNet
California, Virginia, and Colorado are the only other states with a privacy law.
Infosecurity News
Embracing change and collaboration are key to government-backed DSbD initiative, which aims to transform UK's approach to cybersecurity
ThreatPost
Researchers have discovered how to remotely manipulate the Amazon Echo through its own speakers.
ZDNet
Expected to be operational by year-end, the Singapore Armed Forces' digital intelligence unit will look to boost the country's defence against threats in the digital space, which has seen growing and increasingly sophisticated attacks.
Infosecurity News
Effective training and senior leadership buy-in are critical to creating a security-first culture, according to cyber experts
Infosecurity News
Fredrik Hult, CISO at PagoNxt, argued that the
ZDNet
Burnout might be the most critical cybersecurity risk facing organizations in 2022. So, how do we tackle it?
ThreatPost
Sonya Duffin, ransomware and data-protection expert at Veritas Technologies, shares three steps organizations can take today to reduce cyberattack fallout.
The Hacker News
From Pet Systems to Cattle Farm — What Happened to the Data Center?
ZDNet
Summary: More businesses are expected to appoint chief trust officers to drive their focus on security and risk management, which may be necessary this year as ransomware and supply chain attacks are projected to escalate.
ZDNet
Researchers detail how some ransomware groups are shifting towards smaller targets, but ones where they can still guarantee a significant payday.
Computerworld
Is Google's latest plan for balancing privacy with advertising actually a problem? These four revealing questions will help you find out.
ThreatPost
Companies must take more ‘innovative and proactive’ approaches to security in 2022 to combat threats that emerged last year, researchers said.
ThreatPost
It's not about buying security products! Joseph Carson, chief security scientist from ThycoticCentrify, offers practical steps to start the zero-trust journey.
Trend Micro
The Trend Micro™ Managed XDR team addressed a stealthy multilayered attack that progressed from an exploited endpoint vulnerability to the use of legitimate remote access tools including Remote Desktop Protocol (RDP) as its final means of intrusion.