๐ด Defending Against Attacks on Vulnerable IoT Devices ๐ด
๐ Read
via "Dark Reading".
Organizations must approach cybersecurity as if they are defending themselves in a cyberwar.๐ Read
via "Dark Reading".
Darkreading
Defending Against Attacks on Vulnerable IoT Devices
Organizations must approach cybersecurity as if they are defending themselves in a cyberwar.
๐ด Oil Giant Aramco Drills Down on Saudi ICS Security ๐ด
๐ Read
via "Dark Reading".
Saudi Arabia's national oil and gas company is investing in an operational technology security training academy for organizations across the Kingdom. ๐ Read
via "Dark Reading".
Dark Reading
Oil Giant Aramco Drills Down on Saudi ICS Security
Saudi Arabia's national oil and gas company is investing in an operational technology security training academy for organizations across the Kingdom.
๐ด Qatar & Rwanda Partner to Boost Cybersecurity in Africa ๐ด
๐ Read
via "Dark Reading".
The two countries will work on AI security guardrails, public key infrastructure, smart city cyber, and more.๐ Read
via "Dark Reading".
Dark Reading
Qatar & Rwanda Partner to Boost Cybersecurity in Africa
The two countries will work on AI security guardrails, public key infrastructure, smart city cyber, and more.
๐ด After Critical Bug Disclosures, TETRA Emergency Comms Code Goes Public ๐ด
๐ Read
via "Dark Reading".
After the encryption algorithm used by public safety, military, and governments globally was found to allow eavesdropping, standard maintainers are making TETRA open source. ๐ Read
via "Dark Reading".
Dark Reading
After Critical Bug Disclosures, TETRA Emergency Comms Code Goes Public
After the encryption algorithm used by public safety, military, and governments globally was found to allow eavesdropping, standard maintainers are making TETRA open source.
๐ด Cyber Resilience Requires Maturity, Persistence & Board Engagement ๐ด
๐ Read
via "Dark Reading".
Women in Cyber Security Middle East highlight a requirement for resilience in the face of increased business and cyber challenges.๐ Read
via "Dark Reading".
Dark Reading
Cyber Resilience Requires Maturity, Persistence & Board Engagement
Women in Cyber Security Middle East highlight a requirement for resilience in the face of increased business and cyber challenges.
๐ด EU Tightens Cybersecurity Requirements for Critical Infrastructure and Services ๐ด
๐ Read
via "Dark Reading".
Organizations in sectors deemed "essential" or "important" have until October 2024 to comply with the Network and Information Systems Directive 2022 (NIS2).๐ Read
via "Dark Reading".
Dark Reading
EU Tightens Cybersecurity Requirements for Critical Infrastructure and Services
Organizations in "essential" sectors have until October 2024 to comply with the Network and Information Systems Directive 2022 (NIS2).
๐ด 'AlphaLock' Hacker Organization Launches Pen-Testing Training Group ๐ด
๐ Read
via "Dark Reading".
With a two-pronged approach, the group trains its hackers in penetration testing, only to set them free to build a marketplace for pen-testing services.๐ Read
via "Dark Reading".
Dark Reading
'AlphaLock' Hackers Launch 'Pen-Testing Training' Group
With a two-pronged approach, the group trains its hackers in penetration testing, only to set them free to build a marketplace for pen-testing services.
๐ด Rackspace Ransomware Costs Soar to Nearly $12M ๐ด
๐ Read
via "Dark Reading".
Rackspace's 2022 ransomware attack only continue to mount, with lawsuits in the offing โ and show the long-tail costs of a cyberattack. ๐ Read
via "Dark Reading".
Dark Reading
Rackspace Ransomware Costs Soar to Nearly $12M
Rackspace's 2022 ransomware attack costs only continue to mount, with lawsuits in the offing โ and show the long-tail costs of a cyberattack.
๐ด Egress and KnowBe4 Extend Partnership to Offer AI-based Adaptive Email Security and Training ๐ด
๐ Read
via "Dark Reading".
๐ Read
via "Dark Reading".
Dark Reading
Egress and KnowBe4 Extend Partnership to Offer AI-based Adaptive Email Security and Training
PRESS RELEASE
๐ฆฟ Microsoft Ignite: New Solutions Offer More Security and Productivity from Windows in the Cloud ๐ฆฟ
๐ Read
via "Tech Republic".
Cloud PCs give you access to Windows AI tools on any device, and Windows 365 now has AI-powered tools to help IT give users the right cloud PC for their needs.๐ Read
via "Tech Republic".
TechRepublic
Microsoft Ignite: New Solutions Offer More Security and Productivity from Windows in the Cloud
During Microsoft Ignite, the company announced AI, Windows 365, Azure Virtual Desktop solutions and more tools. Get the details.
๐ฆฟ Intel Patches Widespread Processor Vulnerability ๐ฆฟ
๐ Read
via "Tech Republic".
The strange vulnerability could have allowed for escalation of privilege, denial of service or information disclosure attacks.๐ Read
via "Tech Republic".
TechRepublic
Intel Patches Widespread Processor Vulnerability
The strange vulnerability could have allowed for escalation of privilege, denial of service or information disclosure attacks.
๐ด 3 Ways Behavioral Economics Obstructs Cybersecurity ๐ด
๐ Read
via "Dark Reading".
People are not robots; their decisions are based on emotion as much as data. Often, this can lead them to make mistakes with serious security implications for the business. ๐ Read
via "Dark Reading".
Dark Reading
3 Ways Behavioral Economics Obstructs Cybersecurity
People are not robots; their decisions are based on emotion as much as data. Often, this can lead them to make mistakes with serious security implications for the business.
๐ Wireshark Analyzer 4.2.0 ๐
๐ Read
via "Packet Storm Security".
Wireshark is a GTK+-based network protocol analyzer that lets you capture and interactively browse the contents of network frames. The goal of the project is to create a commercial-quality analyzer for Unix and Win32 and to give Wireshark features that are missing from closed-source sniffers. This is the source code release.๐ Read
via "Packet Storm Security".
Packetstormsecurity
Wireshark Analyzer 4.2.0 โ Packet Storm
Information Security Services, News, Files, Tools, Exploits, Advisories and Whitepapers
๐ด FBI Warns: Five Weeks In, Gaza Email Scams Still Thriving ๐ด
๐ Read
via "Dark Reading".
Cybercriminals are playing both sides with simple disaster scams, and it's working.๐ Read
via "Dark Reading".
Dark Reading
FBI Warns: 5 Weeks In, Gaza Email Scams Still Thriving
Cybercriminals are playing both sides with simple disaster scams, and it's working.
๐ด Unpatched Critical Vulnerabilities Open AI Models to Takeover ๐ด
๐ Read
via "Dark Reading".
The security holes can allow server takeover, information theft, model poisoning, and more.๐ Read
via "Dark Reading".
Dark Reading
Unpatched Critical Vulnerabilities Open AI Models to Takeover
The security holes can allow server takeover, information theft, model poisoning, and more.
๐ด Consumer Software Security Assessment: Should We Follow NHTSA's Lead? ๐ด
๐ Read
via "Dark Reading".
Vehicles are required to meet basic safety standards. Having similar requirements for software would give consumers greater control over their privacy and security.๐ Read
via "Dark Reading".
Dark Reading
Consumer Software Security Assessment: Should We Follow NHTSA's Lead?
Vehicles are required to meet basic safety standards. Having similar requirements for software would give consumers greater control over their privacy and security.
๐ด 'Randstorm' Bug: Millions of Crypto Wallets Open to Theft ๐ด
๐ Read
via "Dark Reading".
The security vulnerability in a component of a widely used JavaScript implementation of Bitcoin makes passwords guessable via brute-force attacks.๐ Read
via "Dark Reading".
Dark Reading
'Randstorm' Bug: Millions of Crypto Wallets Open to Theft
The security vulnerability in a component of a widely used JavaScript implementation of Bitcoin makes passwords guessable via brute-force attacks.
โ๏ธ Alleged Extortioner of Psychotherapy Patients Faces Trial โ๏ธ
๐ Read
via "Krebs on Security".
Prosecutors in Finland this week commenced their criminal trial against Julius Kivimรคki, a 26-year-old Finnish man charged with extorting a once popular and now-bankrupt online psychotherapy practice and thousands of its patients. In a 2,200-page report, Finnish authorities laid out how they connected the extortion spree to Kivimรคki, a notorious hacker who was convicted in 2015 of perpetrating tens of thousands of cybercrimes, including data breaches, payment fraud, operating a botnet and calling in bomb threats.๐ Read
via "Krebs on Security".
Krebs on Security
Alleged Extortioner of Psychotherapy Patients Faces Trial
Prosecutors in Finland this week commenced their criminal trial against Julius Kivimรคki, a 26-year-old Finnish man charged with extorting a once popular and now-bankrupt online psychotherapy practice and thousands of its patients. In a 2,200-page report,โฆ
๐ด 'CacheWarp' AMD VM Bug Opens the Door to Privilege Escalation ๐ด
๐ Read
via "Dark Reading".
Academics in Germany figured out how to reverse time in AMD virtualization environments, then reap the spoils.๐ Read
via "Dark Reading".
Dark Reading
'CacheWarp' AMD VM Bug Opens the Door to Privilege Escalation
Academics in Germany figured out how to reverse time in AMD virtualization environments, then reap the spoils.
๐ด Dangerous Apache ActiveMQ Exploit Allows Stealthy EDR Bypass ๐ด
๐ Read
via "Dark Reading".
There's no time to waste: For organizations on the fence about patching the critical bug in ActiveMQ, the new proof-of-concept exploit should push them towards action.๐ Read
via "Dark Reading".
Dark Reading
Dangerous Apache ActiveMQ Exploit Allows Stealthy EDR Bypass
There's no time to waste: For organizations on the fence about patching the critical bug in ActiveMQ, the new proof-of-concept exploit should push them towards action.