Cyber security aggregate rss news

Cyber security aggregator - feeds history

image for Pro-Russian and Pro- ...

 Cyber News

“Politics makes strange bedfellows” is an old saying that apparently applies to hacktivist groups too. In recent days, Cyble threat intelligence researchers have observed pro-Russian and pro-Palestinian hacktivists uniting against France in retaliation for the country's support of Ukraine and Israel. Uniting   show more ...

under the banner the “Holy League,” the groups declared cyberwar against France amid a no-confidence vote in Parliament against Prime Minister Michel Barnier and a visit by U.S. President-elect Donald Trump. The Holy League alliance is also noteworthy because it comes amid the ouster of Russian-backed Syrian President Bashar-al-Assad, a revolution supported by pro-Islamic groups. “This alliance highlights a pragmatic convergence of interests, where shared objectives in destabilizing common adversaries outweigh ideological differences,” Cyble noted. “This political turmoil has created a vulnerable environment, providing hacktivist groups with an opportunity to sow chaos, disrupt public order by disrupting public and critical infrastructure, and amplify uncertainty within the nation,” Cyble wrote. The Holy League discovery closely follows Cyble’s detection of a new threat campaign against Russian organizations waged by the pro-Ukraine hacktivist group “Head Mare.” The Hacktivists Uniting Against France Cyble Research & Intelligence Labs (CRIL) researchers said the hacktivist alliance known as the “Holy League” declared cyberwar on France on Dec. 6 on their Telegram channel. The announcement was echoed by prominent members of the alliance, such as the pro-Russian group NoName057(16), the pro-Islamic threat group Mr. Hamza, and the pro-Palestinian collective Anonymous Guys, and coordinated attacks followed, “demonstrating a unified effort among ideologically diverse threat actors to target French assets,” Cyble said. Between Dec. 7 and Dec. 10, Cyble said the hacktivist groups “executed DDoS attacks, compromised Industrial Control Systems (ICS), conducted website defacements, and claimed data breaches of several French entities.” Holy League Launches DDoS Attacks, Breaches, Defacements Cyble documented 10 groups involved in the attacks against France, which included DDoS attacks, data breaches and website defacement. NoName057(16) and the People’s Cyber Army primarily focused on the official websites of French cities and private organizations, including French financial giant AXA. Mr. Hamza targeted high-value government targets, including the Ministry of Foreign Affairs, the French Directorate-General for External Security (DGSE), the French National Nuclear Energy Commission (CEA), and the French National Cybersecurity Agency (ANSSI). Anonymous Guys targeted ministries and governmental departments, such as the Ministry of Armed Forces, the Ministry of Agriculture and Food, and the Ministry of Solidarity and Health. In all, Cyble observed more than 50 DDoS attacks against French websites over the four days. The pro-Russian group Z-Pentest, meanwhile, conducted defacement attacks against smaller enterprises spanning Energy and Utilities, Agriculture and Livestock, the Automotive sector, and Hospitality, defacing websites with pro-Russian statements. Also read: New Russian Threat Group Z-Pentest Targets Energy System Controls Four Holy League members – Hunt3rKill3rs, Shadow Unit, EvilNet and KozSec – claimed breaches of several systems in France. Shadow Unit, a pro-Islamic hacktivist group, claimed breaches of the SCADA systems of Corus Nuclear Power Plant and the French Marne Aval station. Shadow Unit and UserSec claimed separate breaches of the urban planning site plubioclimatique.paris.fr, exfiltrating more than 50 PDF documents and 100GB of data from French Government websites. Campaign Signals 'A New Era of Cyber Conflict' Cyble said the cyberattacks “underscore a new, broader geopolitical landscape where hacktivist alliances can sow and exploit discord for their objectives. The collaboration between ideologically diverse groups, such as pro-Islamic and pro-Russian hacktivists, signals a shift in how adversaries may align their interests against common targets. “The implications extend beyond France, as similar threats loom over other nations, signaling a new era of cyber conflict where common adversaries may overshadow ideological differences.”

image for NCSC Q3 2024 Report  ...

 Firewall Daily

New Zealand's National Cyber Security Centre (NCSC) has released its highly anticipated Cyber Security Insights Report for the third quarter of 2024. This report reveals new trends in the frequency and sophistication of cyber incidents across the country. With a 58% rise in reported cyber incidents from the   show more ...

previous quarter, the NCSC Q3 2024 Report provides an essential snapshot of new and emerging cyber threats. Cyber Incidents Surge by 58%, According to NCSC Q3 2024 Report The NCSC Cyber Security Insights Report for Q3 2024 highlights a total of 1,905 reported cyber incidents, marking a notable 58% increase compared to the previous quarter. Although this surge may appear concerning at first glance, the NCSC interprets it as a positive sign that more individuals and organizations are proactively reporting incidents, thereby strengthening New Zealand's overall cybersecurity posture.  "The increase in incident reporting is encouraging, as it indicates growing awareness among businesses and individuals about the importance of cybersecurity," stated an NCSC spokesperson. This trend reflects a heightened commitment to protecting personal and organizational digital assets from cyber threats.  The NCSC Cyber Security Insights Report identifies phishing and credential harvesting attacks as the most common tactics used by cybercriminals, with these incidents alone seeing a 70% increase in Q3 2024. These attacks, which typically involve fraudsters attempting to steal sensitive information through deceptive links or websites, have become a dominant threat for individuals and businesses alike.  Key Cybersecurity Trends Identified in the Report Several disturbing trends emerge from the NCSC's Q3 2024 findings. Unauthorized access incidents, for instance, nearly doubled, signaling that attackers are increasingly targeting business and personal networks. Another growing concern is the rise of Adversary-in-the-Middle (AitM) phishing attacks, which compromise session cookies to bypass traditional security measures.  Additionally, the report discusses the emergence of a new technology aimed at combatting online fraud: dynamic CVVs. This advanced security feature adds an extra layer of protection to online transactions by generating one-time codes for cardholders, offering a more secure alternative to traditional static CVVs.  With the holiday season fast approaching, the NCSC also issued warnings about common scams designed to exploit unsuspecting consumers. As people prepare for online shopping, the NCSC encourages Kiwis to be vigilant and visit its Own Your Online website for practical advice on recognizing and avoiding scams.  Financial Impact of Cyber Incidents Despite the increase in the number of reported incidents, the financial losses associated with cybercrime decreased by 19% in Q3 2024, totaling $5.5 million in direct losses. However, it is important to note that 25% of all reported incidents still resulted in some form of financial loss.  The breakdown of incidents shows that phishing and credential harvesting attacks continue to be the most prevalent cybercrimes, accounting for 43% of all reported incidents. Other common categories include scams and fraud (31%), and unauthorized access (16%). Here’s a closer look at the breakdown of incidents for Q3 2024: Phishing and Credential Harvesting: 823 incidents (up 70%)  Scams and Fraud: 596 incidents (up 37%)  Unauthorized Access: 300 incidents (up 80%)  Website Compromise: 56 incidents (up 65%)  Malware: 29 incidents (up 61%)  Ransomware: 13 incidents (up 86%)  Botnet Traffic: 4 incidents (up 300%)  Suspicious Network Traffic: 2 incidents (down 50%)  Denial of Service: 1 incident (down 75%)  C&C Server Hosting: 1 incident (no change)  Attack on a System: 0 incidents (no change)  Other: 80 incidents (up 63%)  NCSC's Phishing Disruption Service Makes Strides One of the NCSC’s most effective tools in the fight against cybercrime is its Phishing Disruption Service (PDS). This free service enables the NCSC to collect, analyze, and block phishing links reported by the public. In Q3 2024 alone, the NCSC processed more than 20,500 phishing indicators, with over 6,200 of them added to the PDS database.  The most frequently impersonated industries in phishing schemes during the quarter were postage and shipping services, reflecting a broader trend of scammers targeting the growing e-commerce and logistics sectors.  National Impact and Recommendations from NCSC Q3 2024 Report While the NCSC Q3 2024 report identifies 98 incidents affecting national organizations, none of these have been classified as "high national emergencies." Nevertheless, the rising number of cyber incidents points to the increasing sophistication of cybercriminals and the need for enhanced cybersecurity measures across all sectors.  As cybercriminals continue to adapt their strategies, the NCSC stresses the importance of strong security practices, including the implementation of multi-factor authentication, regular software updates, and advanced threat detection systems.

image for Krispy Kreme Faces C ...

 Features

Krispy Kreme disclosed a cyberattack impacting its operations, most notably disrupting online ordering services in parts of the United States. The Krispy Kreme cyberattack was announced in a filing with the U.S. Securities and Exchange Commission (SEC), which revealed that the incident had caused "certain   show more ...

operational disruptions." While Krispy Kreme shops continue to operate globally, with in-person orders unaffected, online services have faced significant challenges as a result of the Krispy Kreme cyberattack.  Details of the Krispy Kreme Cyberattack According to Krispy Kreme’s filing, the company was first alerted to unauthorized activity in its information technology systems on November 29, 2024. The company promptly initiated an investigation and began working with cybersecurity experts to contain and address the breach. Despite the disruption to online ordering, the company assured customers that in-store operations and deliveries to retail and restaurant partners were not affected.  Krispy Kreme’s response to the breach has been thorough, involving cybersecurity specialists to mitigate the effects of the cyberattack. The company is also working to restore its online ordering system. However, as the investigation remains ongoing, the full extent of the breach—along with its potential long-term impact—is still unclear.  Financial and Operational Impact In the SEC filing, Krispy Kreme acknowledged that the cyberattack had already caused material disruption to the business, particularly in terms of digital sales. While the company continues its recovery efforts, it has highlighted the financial implications of the data breach. These include lost revenue from the interruption of online services, costs associated with cybersecurity experts, and the restoration of affected systems.  Krispy Kreme has insurance coverage for cybersecurity incidents, which is expected to offset some of these costs. Despite the ongoing recovery efforts, the company stated that it does not anticipate the attack will have a long-term negative impact on its financial condition or operational results.  Ongoing Investigation and Law Enforcement Involvement Krispy Kreme, headquartered in Charlotte, North Carolina, is a well-known global doughnut chain with over 1,000 locations worldwide and a workforce of over 21,000 employees. The company has a large presence in the U.S., particularly in the coffee and snack shop sectors, where it holds a notable market share in the doughnut industry.  As part of the company’s efforts to address the cyberattack, Krispy Kreme has notified federal law enforcement agencies about the breach. The investigation into the incident is still in progress, and more details may emerge as the company continues to work with its external cybersecurity team. Krispy Kreme has not yet provided further details on the nature of the attack, but it is clear that the incident is still being carefully monitored.  At the time of writing, the company has yet to respond to inquiries from The Cyber Express regarding the specifics of the data breach and its plans for recovery. However, the company’s ongoing efforts to mitigate the impact suggest it is taking steps to secure its systems and restore normal operations.  Conclusion While the immediate impact of the cyberattack on Krispy Kreme has been disruptive, the company remains optimistic about its ability to recover quickly. The cyberattack on Krispy Kreme is unlikely to have long-term financial consequences, according to the company's statements. However, as the investigation progresses, more details may emerge regarding the full scope and nature of the attack, as well as its broader implications for the company’s cybersecurity measures. The Cyber Express will continue to monitor the situation and provide updates as more information becomes available or as the company issues an official statement regarding the Krispy Kreme cyberattack and its aftermath. 

image for Which encrypted file ...

 Threats

No one can deny the convenience of cloud file-storage services like Dropbox or OneDrive. The one drawback is that cybercriminals, intelligence agencies, or the hosting provider itself can view your cloud-based files without authorization. But theres a more secure alternative: encrypted cloud file-storage. Some call it   show more ...

end-to-end encryption (E2EE) — similar to Signal and WhatsApp. According to the marketing blurb, files are encrypted on your device and sent to the cloud already in secure form — the encryption key remaining in your possession and no one elses. Not even the provider can sniff this information. But is that really the case? Swiss-cheese encryption The Applied Cryptography Group at ETH Zurich took apart the algorithms of five popular encrypted storage services: Sync.com, pCloud, Icedrive, Seafile, and Tresorit. In each of them, the researchers found errors in the implementation of encryption allowing, to varying degrees, file manipulation, and even access to fragments of unencrypted data. Earlier, theyd discovered flaws in two other popular hosting services —  MEGA and Nextcloud. In all cases, attacks are carried out from a malicious server. The scenario is as follows: the intruders either hack the encrypted hosting servers, or, by manipulating routers along the client-to-server path, force the victims computer to connect to another server mimicking the genuine encrypted hosting server. If this tricky maneuver succeeds, the attackers can theoretically: In the case of com, plant folders and files with incriminating information, and change the file names and metadata of stored information. Also, the hacked server can send new encryption keys to the client, then decrypt any files downloaded afterwards. Plus, the built-in share function allows the malicious server to decrypt any file shared by the victim, since the decryption key is contained in the link thats sent when the server is accessed. In the case of pCloud, plant files and folders, arbitrarily move files and swap file names, delete file fragments, and decrypt files downloaded post-hack. In the case of Seafile, force the client to use an older version of the protocol, making it easier to bruteforce passwords, swap or delete file fragments, plant files and folders, and modify file metadata. In the case of Icedrive, plant files consisting of fragments of other files already uploaded to the cloud, change the name and location of stored files, and reorder file fragments. In the case of Tresorit, manipulate the metadata of stored files— including authorship. In the case of Nextcloud, manipulate encryption keys — allowing decryption of downloaded files. In the case of MEGA, restore encryption keys and thus decrypt all files. Its also possible to plant incriminating files. The malicious server in each case is a hard-to-implement but not blue-sky component of the attack. In light of the cyberattacks on Microsoft and Twilio, the possibility of compromising a major player is real. And of course, E2EE by definition needs to be resistant to malicious server-side actions. Without going into technical details, we note that the developers of all the services seem to have implemented bona fide E2EE and used recognized, strong algorithms like AES and RSA. But file encryption creates a lot of technical difficulties when it comes to document collaboration and co-authoring. The tasks required to overcome these difficulties and factor in all possible attacks involving modified encryption keys remain unsolved, but Tresorit has done a far better job than anyone else. The researchers point out that the developers of the various services made very similar errors independently of each other. This means that the implementation of encrypted cloud storage is fraught with non-trivial cryptographic nuances. Whats needed is a well-developed protocol thoroughly tested by the cryptographic community — such as TLS for websites or the Signal Protocol for instant messengers. Costly fixes The biggest problem with fixing the identified bugs is that not only do the applications and server software need updating, but also, in many cases, user-saved files need re-encrypting. Not every hosting provider can afford these huge computational outlays. Whats more, re-encryption is only possible in cooperation with each user — not unilaterally. Which is probably why fixes are slow in coming: com responded to the researchers after six months, and only after the appearance of press reports. Having finally woken up, they announced a fix for the problem of key leakage when sharing links, and said theyd to patch the other flaws as well — but without giving a time frame. Tresorit promised to fix the issue in 2025 (but the problem is less acute for them). Seafile fixed the issue of protocol version downgrade without commenting on the other flaws. Icedrive decided not to address the identified issues. pCloud didnt respond to the researchers until the appearance of press reports, then announced that the attacks are theoretical and dont require immediate action. Nextcloud fixed the issue and majorly reworked the overall approach to E2EE in version 3.12. The updated encryption scheme has yet to be researched. MEGA significantly lowered the likelihood of an attack by introducing client-side checks. What users need to do Although the issues identified by the Applied Cryptography Group cannot be called purely theoretical, they do not represent a mass threat readily exploitable by cybercriminals. Therefore, hasty action isnt required; rather — a sober assessment of your situation is needed: How sensitive is the data in your storage, and how tempting is it to outsiders? How much data do you store in the encrypted service, and is it easy to move to another? How important are the collaboration and file-sharing features? If collaboration isnt important, while the data stored is critical, the best option is to switch to local file encryption. You can do this in a variety of ways — for example, by storing data in an encrypted container file or an archive with a strong password. If you need to transfer data to another device, you can upload an already encrypted archive to the cloud hosting service. If you want to combine collaboration and convenience with proper security guarantees, and the amount of stored data isnt that great, its worth moving the data to one of the services that better withstood ETH Zurichs testing. That means Tresorit first and foremost, but dont discount MEGA and Nextcloud. If none of these solutions fits the bill, you can opt for other encrypted hosting services, but with additional precautions: avoid storing highly sensitive data, promptly update client applications, regularly check your cloud drives, and delete outdated or extraneous information. In any case, remember that the most likely attack on your data will take the shape of an infostealer simply compromising your computer or smartphone. Therefore, encrypted hosting must go hand in hand with full anti-malware protection for all smartphones and computers.

 Feed

A global law enforcement operation has failed 27 stresser services that were used to conduct distributed denial-of-service (DDoS) attacks and took them offline as part of a multi-year international exercise called PowerOFF. The effort, coordinated by Europol and involving 15 countries, dismantled several booter and stresser websites, including zdstresser.net, orbitalstress.net, and

 Feed

Malicious actors are exploiting a critical vulnerability in the Hunk Companion plugin for WordPress to install other vulnerable plugins that could open the door to a variety of attacks. The flaw, tracked as CVE-2024-11972 (CVSS score: 9.8), affects all versions of the plugin prior to 1.9.0. The plugin has over 10,000 active installations. "This flaw poses a significant security risk, as it

 Feed

Cybersecurity researchers are warning that thousands of servers hosting the Prometheus monitoring and alerting toolkit are at risk of information leakage and exposure to denial-of-service (DoS) as well as remote code execution (RCE) attacks. "Prometheus servers or exporters, often lacking proper authentication, allowed attackers to easily gather sensitive information, such as credentials and API

 Feed

The Russia-linked state-sponsored threat actor tracked as Gamaredon has been attributed to two new Android spyware tools called BoneSpy and PlainGnome, marking the first time the adversary has been discovered using mobile-only malware families in its attack campaigns. "BoneSpy and PlainGnome target former Soviet states and focus on Russian-speaking victims," Lookout said in an analysis. "Both

 Feed

Details have emerged about a now-patched security vulnerability in Apple's iOS and macOS that, if successfully exploited, could sidestep the Transparency, Consent, and Control (TCC) framework and result in unauthorized access to sensitive information. The flaw, tracked as CVE-2024-44131 (CVSS score: 5.3), resides in the FileProvider component, per Apple, and has been addressed with improved

 Feed

SaaS services are one of the biggest drivers of OpEx (operating expenses) for modern businesses. With Gartner projecting $247.2 billion in global SaaS spending this year, it’s no wonder SaaS budgets are a big deal in the world of finance and IT. Efficient SaaS utilization can significantly affect both the bottom line and employee productivity.  In this article, we’ll break down this topic

 Data loss

A Canadian man is arrested in relation to the Snowflake hacks from earlier this year - after a cybersecurity researcher managed to track his identity, and a cryptocurrency-trading Instagram influencer is in trouble with the law. All this and more is discussed in the latest edition of the "Smashing Security" podcast by cybersecurity veterans Graham Cluley and Carole Theriault.

 Data loss

Krispy Kreme, the dispenser of delectable doughnuts, says that it suffered a cyber attack at the end of last month which saw its IT systems compromised and has disrupted online orders in parts of the United States. Read more in my article on the Hot for Security blog.

 Denial of Service

Operation PowerOFF has disrupted what was anticipated to be a surge of distributed denial-of-service (DDoS) attacks over the Christmas period by taking over two dozen "booter" or "stresser" websites offline. Read more in my article on the Tripwire State of Security blog.

 'Cyber

Source: cyble.com – Author: daksh sharma. Overview The Cybersecurity and Infrastructure Security Agency (CISA) added a critical vulnerability, CVE-2024-49138, to its Known Exploited Vulnerabilities (KEV) catalog based on evidence that this flaw is being actively exploited. The vulnerability, identified in the   show more ...

Microsoft Windows Common Log File System (CLFS), is a heap-based buffer overflow issue that […] La entrada CISA Adds CVE-2024-49138 to the Known Exploited Vulnerabilities Catalog, Urgency for Microsoft Users – Source:cyble.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 'Cyber

Source: cyble.com – Author: daksh sharma. The NCSC’s Cyber Security Insights Report for Q3 2024 shows 1,905 incidents, a 58% rise, with phishing and credential harvesting attacks up by 70%. Overview New Zealand’s National Cyber Security Centre (NCSC) has revealed its Cyber Security Insights Report for Q3   show more ...

2024, offering a detailed overview of the cyber […] La entrada NCSC Q3 2024 Report Highlights Cyber Incidents Surge By 58%, Highlighting Cyber Threats to New Zealand – Source:cyble.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Chinese

Source: www.darkreading.com – Author: Kristina Beek, Associate Editor, Dark Reading Source: B Christopher via Alamy Stock Photo NEWS BRIEF The US government unsealed charges yesterday against a Chinese national who allegedly broke into approximately 81,000 of Sophos firewall devices around the world in 2020.   show more ...

Guan Tianfeng, also known as gbigmao and gxiaomao, was charged with […] La entrada Chinese Hacker Pwns 81K Sophos Devices With Zero-Day Bug – Source: www.darkreading.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Cyber Security News

Source: www.darkreading.com – Author: Becky Bracken, Senior Editor, Dark Reading Source: Matthew Horwood via Alamy Stock Photo US doughnut dealer Krispy Kreme suffered a cybersecurity incident that’s made a mess of online ordering but spared retail operations that continue to serve up sugar-coated   show more ...

confections nationwide. A Securities and Exchange Commission filing from Krispy Kreme disclosed […] La entrada Krispy Kreme Doughnut Delivery Gets Cooked in Cyberattack – Source: www.darkreading.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Cyber Security News

Source: www.darkreading.com – Author: Kristina Beek, Associate Editor, Dark Reading Source: ArtemisDiana via Alamy Stock Photo A future that uses quantum computing is not far off — but not quite here either. When it does arrive, it will ultimately render the methods we use to encrypt information useless. And   show more ...

while some organizations and businesses may […] La entrada Symmetrical Cryptography Pioneer Targets the Post-Quantum Era – Source: www.darkreading.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Cyber Security News

Source: www.darkreading.com – Author: Elizabeth Montalbano, Contributing Writer Source: Fabio Principe via AdobeStock Photo Researchers cracked a Microsoft Azure method for multifactor authentication (MFA) in about an hour, due to a critical vulnerability that allowed them unauthorized access to a user’s   show more ...

account, including Outlook emails, OneDrive files, Teams chats, Azure Cloud, and more. Researchers at […] La entrada Researchers Crack Microsoft Azure MFA in an Hour – Source: www.darkreading.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Cyber Security News

Source: www.darkreading.com – Author: Dmytro Tereshchenko Source: Alfonso Fabio Iozzino via Alamy Stock Photo COMMENTARY The statistics paint a clear picture — over 9,000 cyber incidents were reported in just the first half of 2024, translating to nearly one new attack every single hour. This escalating risk   show more ...

has pushed cybersecurity to the forefront of business […] La entrada Cybersecurity Lessons From 3 Public Breaches – Source: www.darkreading.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Cyber Security News

Source: www.darkreading.com – Author: Pukar C. Hamal Source: Brain light via Alamy Stock Photo COMMENTARY We witnessed some of the largest data breaches in recent history in 2024, with victims including industry titans like AT&T, Snowflake (and, therefore, Ticketmaster), and more. For US businesses,   show more ...

data breaches cost more than $9 million on average, and they cause lasting damage to customer […] La entrada Tips for Preventing Breaches in 2025 – Source: www.darkreading.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Cyber Security News

Source: www.darkreading.com – Author: Robert Lemos, Contributing Writer Source: Ar_TH via Shutterstock While the US government and at least eight telecommunications firms struggle to defend their networks against the China-sponsored Salt Typhoon group, other nations’ telecommunications firms have often   show more ...

been primary targets for advanced persistent threats (APTs) as well. In 2023, China-linked group Earth Estries […] La entrada Governments, Telcos Ward Off China’s Hacking Typhoons – Source: www.darkreading.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Cyber Security News

Source: www.darkreading.com – Author: Dark Reading Staff NEWS BRIEF Snowflake has announced a new authentication policy that will require all customers to enable multifactor authentication (MFA) on their accounts by November 2025 or risk having their access blocked. The three-phase policy change comes after   show more ...

Snowflake’s recent decision to enable MFA by default on all new […] La entrada Snowflake Rolls Out Mandatory MFA Plan – Source: www.darkreading.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 1 - Cyber Security News Post

Source: www.hackerone.com – Author: johnk. To produce their recent report “The Total Economic Impact Of HackerOne Challenge: Improved Security And Compliance”, Forrester Consulting interviewed customers that switched to HackerOne Challenge, our hacker-powered pentest solution, from traditional pentesting   show more ...

providers. Forrester found that HackerOne Compliance improves security, which in turn reduces customer churn. This second blog in […] La entrada Breaking Down the Benefits of Hacker-Powered Pentests – Source:www.hackerone.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 1 - Cyber Security News Post

Source: www.hackerone.com – Author: johnk. This blog post was written and contributed by Ray Duran on behalf of the PayPal Bug Bounty team. PayPal transitioned its Bug Bounty program to HackerOne in September 2018 and in that time has paid out more than $1.5 million in bounties and resolved over 300   show more ...

vulnerabilities thanks to the […] La entrada PayPal Celebrates Its First Anniversary on HackerOne – Source:www.hackerone.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 1 - Cyber Security News Post

Source: www.hackerone.com – Author: johnk. This guest post is contributed by Dennis Appelt at GitLab and was originally published here. In just nine months since going public with our bug bounty program, our reporter community has made substantial contributions to the security and continued success of GitLab.   show more ...

Since going public, our community of external security researchers […] La entrada GitLab: Reducing the time to payout and a bug bounty anniversary contest – Source:www.hackerone.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 1 - Cyber Security News Post

Source: www.hackerone.com – Author: johnk. The agenda for the third annual hacker-powered security conference, Security@ San Francisco, is live! Security@ is the only conference dedicated to the booming hacker-powered security industry, where hackers and leaders come together to build a safer internet. The   show more ...

conference takes place on October 15, 2019 at the Palace of Fine […] La entrada Announcing the Security@ San Francisco 2019 Agenda – Source:www.hackerone.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 0CISO2CISO

Source: www.hackerone.com – Author: johnk. Development teams are already under stress to innovate faster and in more areas, and that’s just to stay ahead of the competition. It adds even more stress when you start to include the demands of security into their workflow. But with hacker-powered security becoming   show more ...

a must-have for security teams, it’s […] La entrada How HackerOne Fits into the Dev Tools You Know and Love – Source:www.hackerone.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 0CISO2CISO

As we bid 2024 goodbye, we compiled this roundup of our most popular podcast episodes, magazine articles, and blog posts from the year. Source Views: 0 La entrada 2024 Year in Review: SWE’s Most Popular Content se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Cyber Security News

Source: securityboulevard.com – Author: Maycie Belmore The rapid evolution of artificial intelligence (AI) is sending shockwaves through the cybersecurity landscape, and the workforce is feeling the tremors. This isn’t just about automating tasks; it’s about a fundamental shift in cybersecurity skills,   show more ...

roles, and expertise required to defend against increasingly sophisticated cyber threats. But with the […] La entrada AI: Overhyped or Essential for the Workforce? – Source: securityboulevard.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Cyber Security News

Source: securityboulevard.com – Author: Amy Cohn As cybersecurity continues to evolve at an unprecedented pace, businesses are increasingly becoming aware of the need to secure their digital assets, including data and secrets. Among these, “Secrets Sprawl” has emerged as a significant concern in data   show more ...

handling. Secrets sprawl refers to the unchecked proliferation of secrets (encrypted […] La entrada Safe Handling of Data: Why Secrets Sprawl is a Risk – Source: securityboulevard.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Cyber Security News

Source: securityboulevard.com – Author: Amy Cohn Can Strategic Secrets Management Boost Your Confidence? In today’s unpredictable cybersecurity landscape, building confidence in your protections may appear like a challenging endeavour. Yet, the key rests in a proactive and comprehensive approach.   show more ...

Surprisingly, it all comes down to strategic secrets management, a holistic method that includes managing Non-Human […] La entrada Building Confidence with Strategic Secrets Management – Source: securityboulevard.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Cyber Security News

Source: securityboulevard.com – Author: Marc Handelman Home » Security Bloggers Network » DEF CON 32 – Digital Emblems-When Markings Are Required, But You Have No Rattle-Can Authors/Presenters: Bill Woodcock Our sincere appreciation to DEF CON, and the Presenters/Authors for publishing their erudite DEF CON   show more ...

32 content. Originating from the conference’s events located at the Las […] La entrada DEF CON 32 – Digital Emblems-When Markings Are Required, But You Have No Rattle-Can – Source: securityboulevard.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Cyber Security News

Source: www.govinfosecurity.com – Author: Application Security , Next-Generation Technologies & Secure Development Multimodal Agentic AI Delivers Speed, Tools and Research Prototypes Michael Novinson (MichaelNovinson) • December 11, 2024     Image: Shuttershock Google’s latest AI model can   show more ...

natively process and output text, images and audio in the search giant’s push toward more autonomous reasoning, planning […] La entrada Google Gemini 2.0 Introduced With Advanced AI for Developers – Source: www.govinfosecurity.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Cyber Security News

Source: www.govinfosecurity.com – Author: Attack Surface Management , Governance & Risk Management , Patch Management Attackers Target Managed File Transfer Software Vulnerabilities Prajeet Nair (@prajeetspeaks) • December 11, 2024     Image: Cleo Update Dec. 12, 2024, 00:34 UTC: A Cleo spokesperson   show more ...

said the company has released a new patch to address active hacking of […] La entrada Ransomware Hackers Exploiting Cleo Software Zero-Day – Source: www.govinfosecurity.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Cyber Security News

Source: www.govinfosecurity.com – Author: Artificial Intelligence & Machine Learning , Fraud Management & Cybercrime , Fraud Risk Management LexisNexis Combines AI-Driven Document Authentication With Its Fraud Solutions Michael Novinson (MichaelNovinson) • December 11, 2024     Kimberly   show more ...

Sutherland, vice president of fraud and identity strategy, LexisNexis Risk Solutions LexisNexis Risk Solutions plans to purchase a […] La entrada AI Meets Fraud Prevention in LexisNexis-IDVerse Acquisition – Source: www.govinfosecurity.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Clearinghouse

Source: www.govinfosecurity.com – Author: Breach Notification , Governance & Risk Management , Healthcare Inmediata Health Group Has Paid $2.7M in Fines, Civil Claims for 2019 HIPAA Breach Marianne Kolbasuk McGee (HealthInfoSec) • December 11, 2024     Image: Inmediata A breach that exposed the   show more ...

personal health information of nearly 1.6 million patients of a Puerto […] La entrada Clearinghouse Pays $250K Settlement in Web Exposure Breach – Source: www.govinfosecurity.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Cyber Security News

Source: www.govinfosecurity.com – Author: Governance & Risk Management , Zero Trust Presented by Netskope     60 minutes     Are you making decisions based on facts—or fiction? Cybersecurity for federal agencies demands informed, bias-free decisions. This webinar equips you with the insights to cut   show more ...

through the noise, evaluate technologies critically, and stay ahead of […] La entrada Live Webinar | Exposing the Truth: How Government Agencies are Being Mislead by SASE Capabilities Disinformation – Source: www.govinfosecurity.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Apple

Source: www.techrepublic.com – Author: Megan Crouse December brought a relatively mild Patch Tuesday, with one vulnerability having been actively exploited. Of all 70 vulnerabilities fixed, 16 were classified as critical. “This year, cybersecurity professionals must be on Santa’s nice list, or, at the very   show more ...

least, Microsoft’s,” Tyler Reguly, associate director of security R&D at cybersecurity […] La entrada Patch Tuesday: Microsoft Patches One Actively Exploited Vulnerability, Among Others – Source: www.techrepublic.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 China

Source: www.techrepublic.com – Author: Fiona Jackson The U.S. has sanctioned Sichuan Silence, a Chinese cybersecurity firm involved in ransomware attacks targeting critical infrastructure in 2020. One of its employees, Guan Tianfeng, has also been charged individually. Guan, a security researcher, discovered a   show more ...

zero-day vulnerability in a firewall product developed by U.K.-based security firm Sophos. He […] La entrada US Sanctions Chinese Cybersecurity Firm for 2020 Ransomware Attack – Source: www.techrepublic.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Apple

Source: www.techrepublic.com – Author: Esther Shein A great way to stay current with the latest technology trends and innovations is by attending conferences. Read and bookmark our tech events guide. The next year will offer a wide range of conferences and expos for tech professionals and business leaders   show more ...

around the world. Many of these conferences […] La entrada Top Tech Conferences & Events to Add to Your Calendar in 2025 – Source: www.techrepublic.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Cloud Security

Source: www.techrepublic.com – Author: Luis Millares We may earn from vendors via affiliate links or sponsorships. This might affect product placement on our site, but not the content of our reviews. See our Terms of Use for details. Compare CrowdStrike and Wiz on cloud security, features, pricing, and   show more ...

performance to find the best cybersecurity solution […] La entrada CrowdStrike vs Wiz: Which Offers Better Cloud Security and Value? – Source: www.techrepublic.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 best siem tools

Source: www.techrepublic.com – Author: Drew Robb We may earn from vendors via affiliate links or sponsorships. This might affect product placement on our site, but not the content of our reviews. See our Terms of Use for details. Looking for the best SIEM tool? Check out our list and find the security   show more ...

information and event […] La entrada Best SIEM Tools of 2024: Top Solutions for Enhanced Security – Source: www.techrepublic.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Breaking News

Source: securityaffairs.com – Author: Pierluigi Paganini Pierluigi Paganini December 12, 2024 Chinese law enforcement uses the mobile surveillance tool EagleMsgSpy to gather data from Android devices, as detailed by Lookout. Researchers at the Lookout Threat Lab discovered a surveillance tool, dubbed   show more ...

EagleMsgSpy, used by Chinese law enforcement to spy on mobile devices. The researchers analyzed multiple samples […] La entrada Experts discovered surveillance tool EagleMsgSpy used by Chinese law enforcement – Source: securityaffairs.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 booter

Source: securityaffairs.com – Author: Pierluigi Paganini Pierluigi Paganini December 12, 2024 Operation PowerOFF took down 27 DDoS stresser services globally, disrupting illegal platforms used for launching cyberattacks. A global law enforcement operation codenamed Operation PowerOFF disrupted 27 of the most   show more ...

popular platforms (including zdstresser.net, orbitalstress.net, and starkstresser.net) to launch Distributed Denial-of-Service (DDoS) attacks. “Law enforcement […] La entrada Operation PowerOFF took down 27 DDoS platforms across 15 countries – Source: securityaffairs.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Amadey Bot

Source: securityaffairs.com – Author: Pierluigi Paganini Pierluigi Paganini December 12, 2024 Russia-linked APT group Secret Blizzard is using Amadey Malware-as-a-Service to infect systems in Ukraine with the Kazuar backdoor. The Russia-linked APT group Secret Blizzard (aka   show more ...

Turla, Snake, Uroburos, Waterbug, Venomous Bear and KRYPTON) was spotted using the Amadey malware to deploy the KazuarV2 backdoor on devices in Ukraine. Microsoft also assesses that in January […] La entrada Russia’s Secret Blizzard APT targets Ukraine with Kazuar backdoor – Source: securityaffairs.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Cyber Security News

Source: www.securityweek.com – Author: Ionut Arghire Detection-focused threat intelligence firm Silent Push has deposited $10 million in a funding round that brings the total raised by the company to $22 million. Founded in 2020, the Reston, Virginia-based startup has built a platform that provides   show more ...

organizations with behavioral fingerprints of attacker tools, techniques, and procedures (TTPs), […] La entrada Silent Push Raises $10 Million for Preemptive Threat Intelligence Platform – Source: www.securityweek.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Cyber Security News

Source: www.securityweek.com – Author: SecurityWeek News Sublime Security, a Washington, D.C. startup selling a programmable email security platform for Microsoft 365 and Google Workspace, has attracted $60 million in new funding as investors continue to place big bets on the email security business. Sublime   show more ...

said the new capital was provided by IVP, Citi Ventures, Index […] La entrada Sublime Snags $60M Series B for Email Security Tech – Source: www.securityweek.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Acquisition

Source: www.securityweek.com – Author: Eduard Kovacs Fortinet on Wednesday announced the acquisition of Israeli security company Perception Point. Perception Point provides solutions for securing email, collaboration platforms, web browsers, and cloud storage applications, which enable Fortinet to expand and   show more ...

enhance its offering.  Fortinet said it acquired Perception Point for features such as advanced threat detection, […] La entrada Fortinet Acquires Perception Point Reportedly for $100 Million – Source: www.securityweek.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 AI

Source: www.securityweek.com – Author: Marc Solomon The speed at which Artificial Intelligence (AI) continues to expand is unprecedented, particularly since GenAI catapulted into the market in 2022. Today AI works at a much faster pace than human output, which is what makes this technology so appealing to   show more ...

leaders who are focused on streamlining operations, productivity […] La entrada The Ghost of Christmas Past – AI’s Past, Present and Future – Source: www.securityweek.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 China

Source: www.securityweek.com – Author: Ionut Arghire For years, Chinese law enforcement has been using a lawful surveillance tool to collect extensive data from Android devices, cybersecurity firm Lookout reports. Dubbed EagleMsgSpy and created by a Chinese software development company, the tool has been in use   show more ...

since at least 2017, and has only been deployed through […] La entrada Mobile Surveillance Tool EagleMsgSpy Used by Chinese Law Enforcement – Source: www.securityweek.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 AuthQuake

Source: www.securityweek.com – Author: Eduard Kovacs Non-human identity management firm Oasis Security has disclosed the details of an attack that allowed its researchers to bypass Microsoft’s multi-factor authentication (MFA) implementation. The attack method, dubbed AuthQuake, was reported to Microsoft in   show more ...

late June and a temporary fix was rolled out a few days later. The tech […] La entrada Microsoft MFA Bypassed via AuthQuake Attack  – Source: www.securityweek.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

2024-12
Aggregator history
Thursday, December 12
SUN
MON
TUE
WED
THU
FRI
SAT
DecemberJanuaryFebruary