Browsing Category
Cybersecurity
#DEFCON: CISA Director Praises Congress and International Cybersecurity…
Jen Easterly, director of the United States’ Cybersecurity and Infrastructure Agency (CISA), is on a mission to enlist security…
Three Extradited from UK to US on $5m BEC Charges
Three Nigerian nationals have been extradited from the UK to the US after allegedly participating in business email compromise…
New Study Reveals Serious Cyber-Insurance Shortfalls
Only a fifth of North American organizations have cyber-insurance coverage over $600,000, leaving a potentially significant…
Critical Infrastructure at Risk as Thousands of VNC Instances Exposed
Security researchers have warned that countless global organizations might be at risk of remote compromise after discovering more…
It’s Time to Rethink Endpoint Security
By Carolyn Crandall, Chief Security Advocate, Attivo Networks
Sometimes, organizations change from within, while other times…
Meta Tests Encrypted Backups and End-to-End Encryption in Facebook…
Social media giant Meta has announced it will start testing end-to-end encryption (E2EE) as the default option on its Facebook…
Xiaomi Smartphone Vulnerabilities Could Lead to Forged Payments
Vulnerabilities in Xiaomi’s mobile payment could lead to an attacker stealing private keys used to sign Wechat Pay control and…
SolidBit Ransomware Group Recruiting New Affiliates on Dark Web
A threat actor group named SolidBit is actively advertising RaaS (Ransom-as-a-Service) and looking to recruit new affiliates on…
#BHUSA: Bug Bounty Botox – Why You Need a Security Process First
Katie Moussouris is no stranger to the world of bug bounties having helped Microsoft create its first program and now as leader of…
#BHUSA : Failure to Challenge is a Social Engineering Risk
Social engineering is all about blending in, getting potential victims to not notice and just go along with a situation without…