Browsing Category
Cybersecurity
Uber Blames Lapsus$ for Breach
The threat actor responsible for hacking Uber last week is likely connected to the prolific Lapsus$ group, the firm has claimed.…
Critically Important Organization? – Cyber Defense Magazine
Now It Is Critical to Report Security Incidents
By Trip Hillman, Partner, IT Advisory Services, Weaver
Reporting cybersecurity…
Protect Small Businesses from Ransomware
By Prem Khatri, Vice President of Operations, Chetu, Inc.
Ransomware attacks are crippling businesses, government organizations,…
New Spear Phish Methodology Relies on PuTTY SSH Client to Infect Systems
Hackers associated with North Korea are using trojanized versions of the PuTTY SSH open-source terminal emulator to install…
Information Warfare and What Infosec Needs to Know
By Wasim Khaled, Co-Founder and CEO, Blackbird.AI
Cyberthreats are growing more sophisticated by the day, which in terms means…
CISA Expands Vulnerabilities Catalog With Old, Exploited Flaws
The Cybersecurity and Infrastructure Security Agency (CISA) has added six known flaws to its Known Exploited Vulnerabilities…
Omnibus Spending Bill Highlights Need for Protecting Critical…
By Tony D’Angelo, Vice President of Public Sector, Lookout
With international tensions continuing to rise, the Biden…
Allies Warn of Iranian Ransom Attacks Using Log4Shell
Cybersecurity agencies in the US, UK, Australia and Canada have warned that Iranian state-sponsored hackers are exploiting Log4j…
Uber Hacker May Have Compromised Secret Bug Reports
Uber appears to have been breached again, after a threat actor reportedly accessed its email and cloud systems, code repositories,…
Crypto Scams Soar as Domains Surge 335%
Cryptocurrency scams are set to explode after researchers detected a triple-digit increase in registered domains in the first half…