Security

Updates

Cyberattacks: A very real existential threat to organizations
One in five organizations have teetered on the brink of insolvency after a cyberattack. Can your company keep hackers at bay? The post appeared first on
04-07-2022 09:30

Some Worms Use Their Powers for Good
Gardeners know that worms are good. Cybersecurity professionals know that worms are bad. Very bad. In fact, worms are literally the most devasting force for evil known to the computing world. The MyDoom worm holds the dubious position of most costly co
04-07-2022 06:07

Ukrainian Authorities Arrested Phishing Gang That Stole 100 Million UAH
The Cyber Police of Ukraine last week disclosed that it apprehended nine members of a criminal gang that embezzled 100 million hryvnias via hundreds of phishing sites that claimed to offer financial assistance to Ukrainian citizens as part of a campaig
04-07-2022 05:58

HackerOne Employee Caught Stealing Vulnerability Reports for Personal Gains
Vulnerability coordination and bug bounty platform HackerOne on Friday disclosed that a former employee at the firm improperly accessed security reports submitted to it for personal gain. "The person anonymously disclosed this vulnerability informatio
03-07-2022 23:38

Experts: California Lacked Safeguards for Gun Owner Info
Cybersecurity experts say the California Department of Justice apparently failed to follow basic security procedures on its website, exposing the personal information of potentially hundreds of thousands of gun owners.
02-07-2022 15:03

Dutch Uni Gets Cyber Ransom Money Back... With Interest
A Dutch university that fell victim to a massive ransomware attack has partly received back its stolen money... which in the meantime more than doubled in value, a news report said on Saturday.
02-07-2022 11:14

TikTok Assures U.S. Lawmakers it's Working to Safeguard User Data From Chinese Staff
Following heightened worries that U.S. users' data had been accessed by TikTok engineers in China between September 2021 and January 2022, the company sought to assuage U.S. lawmakers that it's taking steps to "strengthen data security." The admission
01-07-2022 21:22

Google Improves Its Password Manager to Boost Security Across All Platforms
Google on Thursday announced a slew of improvements to its password manager service aimed at creating a more consistent look and feel across different platforms. Central to the changes is a "simplified and unified management experience that's the same
01-07-2022 21:01

Microsoft Warns About Evolving Capabilities of Toll Fraud Android Malware Apps
Microsoft has detailed the evolving capabilities of toll fraud malware apps on Android, pointing out its "complex multi-step attack flow" and an improved mechanism to evade security analysis. Toll fraud belongs to a category of billing fraud wherein m
01-07-2022 21:01

The business of hackers-for-hire threat actors
Hackers-for-hire specialize in compromising email boxes. Learn more about these cyber criminals and the threat they represent. The post appeared first on .
01-07-2022 17:57

Data breach of NFT marketplace OpenSea may expose customers to phishing attacks
Triggered by an employee from an external vendor who shared email addresses with an unauthorized party, the breach could lead to phishing attempts against affected individuals. The post appeared first on .
01-07-2022 17:03

Watch out for survey scams – Week in security with Tony Anscombe
As scammers continue to ask people to take fake surveys, can you recognize some common telltale signs you're dealing with a scam? The post appeared first on
01-07-2022 15:00

Phishing scam poses as Canadian tax agency before Canada Day
The lead-up to the Canada Day festivities has brought a tax scam with it The post appeared first on
01-07-2022 14:36

QuSecure Scores Post-Quantum Cybersecurity Contract Worth More Than $100M Annually
Post-Quantum company awarded SBIR III contract to combat ‘harvest now, decrypt later’ threat from quantum computing
01-07-2022 12:45

Google: Half of 2022's Zero-Days Are Variants of Previous Vulnerabilities
Google Project Zero has observed a total of 18 exploited zero-day vulnerabilities in the first half of 2022, at least half of which exist because previous bugs were not properly addressed.
01-07-2022 11:12

Get one year of this leading VPN for just $30
ClearVPN's Premium Plan offers advanced security and connectivity, allowing you to easily protect your devices at an affordable price. The post appeared first on .
01-07-2022 11:00

Google Blocks Domains of Hack-for-Hire Groups in Russia, India, UAE
A blog post published by Google’s Threat Analysis Group on Thursday describes the activities of hack-for-hire gangs in Russia, India and the United Arab Emirates. The internet giant has added more than 30 domains used by these threat groups to its Safe
01-07-2022 10:27

Cyberattack Disrupts Unemployment Benefits in Some States
A cyberattack on a software company has disrupted unemployment benefits and job seeking assistance for thousands of people in several states.
01-07-2022 10:07

Microsoft Warns About Evolving Capabilities of Toll Fraud Android Malware Apps
Microsoft has detailed the evolving capabilities of toll fraud malware apps on Android, pointing out its "complex multi-step attack flow" and an improved mechanism to evade security analysis. Toll fraud belongs to a category of billing fraud wherein m
01-07-2022 09:18

Google Improves Its Password Manager to Boost Security Across All Platforms
Google on Thursday announced a slew of improvements to its password manager service aimed at creating a more consistent look and feel across different platforms. Central to the changes is a "simplified and unified management experience that's the same
01-07-2022 09:03

CISA Warns of Active Exploitation of 'PwnKit' Linux Vulnerability in the Wild
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) this week moved to add a Linux vulnerability dubbed PwnKit to its Known Exploited Vulnerabilities Catalog, citing evidence of active exploitation. The issue, tracked as CVE-2021-4034 (CV
01-07-2022 08:53

New 'SessionManager' Backdoor Targeting Microsoft IIS Servers in the Wild
A newly discovered malware has been put to use in the wild at least since March 2021 to backdoor Microsoft Exchange servers belonging to a wide range of entities worldwide, with infections lingering in 20 organizations as of June 2022. Dubbed SessionM
01-07-2022 08:53

Solving the indirect vulnerability enigma - fixing indirect vulnerabilities without breaking your dependency tree
Fixing indirect vulnerabilities is one of those complex, tedious and, quite frankly, boring tasks that no one really wants to touch. No one except for Debricked, it seems. Sure, there are lots of ways to do it manually, but can it be done automatically
01-07-2022 04:06

Microsoft Warns of Cryptomining Malware Campaign Targeting Linux Servers
A cloud threat actor group tracked as 8220 has updated its malware toolset to breach Linux servers with the goal of installing crypto miners as part of a long-running campaign. "The updates include the deployment of new versions of a crypto miner and
01-07-2022 01:20

Amazon Quietly Patches 'High Severity' Vulnerability in Android Photos App
Amazon, in December 2021, patched a high severity vulnerability affecting its Photos app for Android that could have been exploited to steal a user's access tokens. "The Amazon access token is used to authenticate the user across multiple Amazon APIs,
01-07-2022 00:09

Microsoft Warns of Cryptomining Malware Campaign Targeting Linux Servers
A cloud threat actor group tracked as 8220 has updated its malware toolset to breach Linux servers with the goal of installing crypto miners as part of a long-running campaign. "The updates include the deployment of new versions of a crypto miner and
30-06-2022 22:36

North Korean Hackers Suspected to be Behind $100M Horizon Bridge Hack
The notorious North Korea-backed hacking collective Lazarus Group is suspected to be behind the recent $100 million altcoin theft from Harmony Horizon Bridge, citing similarities to the Ronin bridge attack in March 2022. The finding comes as Harmony c
30-06-2022 22:07

Ex-Canadian Government Employee Pleads Guilty Over NetWalker Ransomware Attacks
A former Canadian government employee this week agreed to plead guilty in the U.S. to charges related to his involvement with the NetWalker ransomware syndicate. Sebastien Vachon-Desjardins, who was extradited to the U.S. on March 10, 2022, is accused
30-06-2022 22:06

U.S. FCC Commissioner Asks Apple and Google to Remove TikTok from App Stores
One of the commissioners of the U.S. Federal Communications Commission (FCC) has renewed calls asking for Apple and Google to boot the popular video-sharing platform TikTok from their app stores citing "its pattern of surreptitious data practices." "I
30-06-2022 22:06

Google Blocks Dozens of Malicious Domains Operated by Hack-for-Hire Groups
Google's Threat Analysis Group (TAG) on Thursday disclosed it had acted to block as many as 36 malicious domains operated by hack-for-hire groups from India, Russia, and the U.A.E. In a manner analogous to the surveillanceware ecosystem, hack-for-hire
30-06-2022 22:05

How traditional security tools fail to protect companies against ransomware
Most organizations surveyed by Titaniam have existing security prevention and backup tools, but almost 40% have still been hit by ransomware attacks in the last year. The post appeared first on .
30-06-2022 19:16

Oak9 Lands $8 Million in New Venture Investment
Chicago-based Infrastructure-as-Code (IaC) startup oak9 has attracted new interest from venture capitalists with Cisco Investments and Morgan Stanley’s Next Level Fund joining a new $8 million funding round.
30-06-2022 18:31

North Korea Lazarus Hackers Blamed for $100 Million Horizon Bridge Heist
The infamous North Korean Lazarus hacking group is the prime suspect in the $100 million hack of Harmony’s Horizon Bridge, according to new data and research from blockchain analytics firm Elliptic.
30-06-2022 17:27

Have you ever found phishing emails confusing? You aren’t alone
Kaspersky explores the ways hackers are able to confuse users through seemingly legitimate email templates. The post appeared first on .
30-06-2022 15:35

LockBit ransomware gang promises bounty payment for personal data
The infamous ransomware-as-a-service group is offering money to researchers and hackers willing to share personal data for exploitation. The post appeared first on .
30-06-2022 15:31

Token Raises $13 Million for Its Biometric Authentication Ring
Wearable authentication solutions provider Token this week announced that it has raised $13 million in Series B funding. To date, the company has raised $22.9 million. Led by Grand Oaks Capital, the investment round will allow Token to accelerate produc
30-06-2022 15:10

Google Workspace Now Warns Admins of Sensitive Changes
Google this week announced that new warnings added in the Google Workspace Alert Center will keep administrators notified of critical and sensitive configuration changes.
30-06-2022 13:37

SOHO routers used as initial point of compromise in stealth attack campaign
The attack campaign, possibly state-sponsored, went undetected for nearly two years while targeting SOHO routers to compromise remote workers. The post appeared first on .
30-06-2022 13:35

Get 15 hours of basic cybersecurity education online for just $29
This bundle provides a strong overview of the cybersecurity field. The post appeared first on .
30-06-2022 13:00

SOHO Routers in North America and Europe Targeted With 'ZuoRAT' Malware
A remote access trojan (RAT) targeting small office/home office (SOHO) devices has remained undetected for nearly two years, according to security researchers with Black Lotus Labs, the threat intelligence arm of Lumen Technologies.
30-06-2022 12:31

Feature: Securing the Metaverse and Web3
Type:  Story Image:  Link: 
30-06-2022 11:53

Brocade Vulnerabilities Could Impact Storage Solutions of Several Major Companies
Broadcom revealed recently that some of the software provided by its storage networking subsidiary Brocade is affected by several vulnerabilities, and it seems possible that the flaws could impact the products of several major companies.
30-06-2022 11:42

Vulnerability in Amazon Photos Android App Exposed User Information
Cybersecurity firm Checkmarx has published details on a high-severity vulnerability in the Amazon Photos Android application that could have allowed malicious apps to steal an Amazon access token.
30-06-2022 11:11

Protect your browsing for life with this innovative hardware
The Deeper Connect Mini Decentralized VPN & Firewall Hardware provides reliable and secure network connectivity worldwide. The post appeared first on .
30-06-2022 11:00

RSAC22 and Infosecurity Europe, Three Weeks, Two Events
In the last couple of years, events were taken online, moved to and conducted using social platforms via video set-up. Events became simpler to attend, but the individual component of the experience was missing – we all wanted to mix with our peers and
30-06-2022 10:33

Canadian NetWalker Ransomware Affiliate Pleads Guilty in US
A Canadian national has pleaded guilty in a United States court to charges related to his role in a cybercrime operation involving the NetWalker ransomware. Sebastien Vachon-Desjardins, 34, is a former Canadian government employee. He was previously sen
30-06-2022 10:20

Cyberattack Hits Norway, Pro-Russian Hacker Group Fingered
A cyberattack temporarily knocked out public and private websites in Norway in the past 24 hours, Norwegian authorities said Wednesday.
30-06-2022 10:18

Costco 40th anniversary scam targets WhatsApp users
If the promise of a cash prize in return for answering a few questions sounds like a deal that is too good to be true, that’s because it is The post appeared first on
30-06-2022 09:30

Google Blocks Dozens of Malicious Domains Operated by Hack-for-Hire Groups
Google's Threat Analysis Group (TAG) on Thursday disclosed it had acted to block as many as 36 malicious domains operated by hack-for-hire groups from India, Russia, and the U.A.E. In a manner analogous to the surveillanceware ecosystem, hack-for-hire
30-06-2022 09:04

U.S. FCC Commissioner Asks Apple and Google to Remove TikTok from App Stores
One of the commissioners of the U.S. Federal Communications Commission (FCC) has renewed calls asking for Apple and Google to boot the popular video-sharing platform TikTok from their app stores citing "its pattern of surreptitious data practices." "I
30-06-2022 05:41

North Korean Hackers Suspected to be Behind $100M Horizon Bridge Hack
The notorious North Korea-backed hacking collective Lazarus Group is suspected to be behind the recent $100 million altcoin theft from Harmony Horizon Bridge, citing similarities to the Ronin bridge attack in March 2022. The finding comes as Harmony c
30-06-2022 05:26

Ex-Canadian Government Employee Pleads Guilty Over NetWalker Ransomware Attacks
A former Canadian government employee this week agreed to plead guilty in the U.S. to charges related to his involvement with the NetWalker ransomware syndicate. Sebastien Vachon-Desjardins, who was extradited to the U.S. on March 10, 2022, is accused
30-06-2022 05:25

What is Shadow IT and why is it so risky?
Shadow IT refers to the practice of users deploying unauthorized technology resources in order to circumvent their IT department. Users may resort to using shadow IT practices when they feel that existing IT policies are too restrictive or get in the w
30-06-2022 04:55

New YTStealer Malware Aims to Hijack Accounts of YouTube Content Creators
Cybersecurity researchers have documented a new information-stealing malware that targets YouTube content creators by plundering their authentication cookies. Dubbed "YTStealer" by Intezer, the malicious tool is likely believed to be sold as a service
29-06-2022 22:37

CISA Warns of Active Exploitation of 'PwnKit' Linux Vulnerability in the Wild
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) this week moved to add a Linux vulnerability dubbed PwnKit to its Known Exploited Vulnerabilities Catalog, citing evidence of active exploitation. The issue, tracked as CVE-2021-4034 (CV
29-06-2022 22:37

New 'FabricScape' Bug in Microsoft Azure Service Fabric Impacts Linux Workloads
Cybersecurity researchers from Palo Alto Networks Unit 42 disclosed details of a new security flaw affecting Microsoft's Service Fabric that could be exploited to obtain elevated permissions and seize control of all nodes in a cluster. The issue, whic
29-06-2022 22:34

10 best antivirus software solutions for your business
Antivirus software protects your data against cybercriminals, ransomware and malware. Compare the best software now. The post appeared first on .
29-06-2022 14:00

Azure Service Fabric Vulnerability Can Lead to Cluster Takeover
Microsoft has patched a vulnerability that could allow an attacker with access to an Azure Linux container to escalate privileges and take over the entire cluster.
29-06-2022 13:57

How to de-anonymize fraudulent Tor web servers
While it is common belief that there is not much that can be done to locate remote servers hosted using the Tor network, a new research reveals it is possible to de-anonymize some and uses ransomware domains hosted on the Dark Web as examples. The post
29-06-2022 13:32

Securing the Metaverse and Web3
29-06-2022 13:31

Firefox 102 Patches 19 Vulnerabilities, Improves Privacy
Mozilla this week announced the availability of Firefox 102 in the stable channel with patches for 19 vulnerabilities, including four high-severity bugs.
29-06-2022 13:26

8 enterprise password managers and the companies that will love them
Looking for the right password management fit for your organization? These eight options all have something to offer, and one may be the best fit for you.  The post appeared first on .
29-06-2022 12:45

CISA Calls for Expedited Adoption of Modern Authentication Ahead of Deadline
The US Cybersecurity and Infrastructure Security Agency (CISA) is urging federal agencies and private organizations to switch to Modern Auth in Exchange Online before October 1, 2022.
29-06-2022 11:51

MITRE Publishes 2022 List of 25 Most Dangerous Vulnerabilities
The US Cybersecurity and Infrastructure Security Agency (CISA) and the nonprofit organization MITRE have published the 2022 list of the 25 most dangerous vulnerabilities.
29-06-2022 11:01

CISA-Funded Project Enables Students With Disabilities to Learn Cybersecurity
Cybersecurity workforce development organization CYBER.ORG on Monday announced the launch of Project Access, a national effort to provide cybersecurity education to blind and visually impaired students.
29-06-2022 10:19

Do back offices mean backdoors?
War in Europe, a reminder for shared service centers and shoring operations to re-examine IT security posture The post appeared first on
29-06-2022 09:30

New UnRAR Vulnerability Could Let Attackers Hack Zimbra Webmail Servers
A new security vulnerability has been disclosed in RARlab's UnRAR utility that, if successfully exploited, could permit a remote attacker to execute arbitrary code on a system that relies on the binary. The flaw, assigned the identifier CVE-2022-30333
29-06-2022 02:29

ZuoRAT Malware Hijacking Home-Office Routers to Spy on Targeted Networks
A never-before-seen remote access trojan dubbed ZuoRAT has been singling out small office/home office (SOHO) routers as part of a sophisticated campaign targeting North American and European networks. The malware "grants the actor the ability to pivot
29-06-2022 00:40

Pentagon finds concerning vulnerabilities on blockchain
A new report reveals that blockchain is neither decentralized nor updated. The post appeared first on .
28-06-2022 22:08

APT Hackers Targeting Industrial Control Systems with ShadowPad Backdoor
Entities located in Afghanistan, Malaysia, and Pakistan are in the crosshairs of an attack campaign that targets unpatched Microsoft Exchange Servers as an initial access vector to deploy the ShadowPad malware. Russian cybersecurity firm Kaspersky, wh
28-06-2022 20:13

New Android Banking Trojan 'Revive' Targeting Users of Spanish Financial Services
A previously unknown Android banking trojan has been discovered in the wild, targeting users of the Spanish financial services company BBVA. Said to be in its early stages of development, the malware — dubbed Revive by Italian cybersecurity firm Cleaf
28-06-2022 20:13

Normalyze Announces $22 Million for DSPM Technology
Bay Area startup Normalyze on Monday announced a $22 million in Series A funding as venture capital investors rush to place bets on the newly coined Data Security Posture Management (DSPM) space.
28-06-2022 19:51

How to transfer data from LastPass to 1Password
Transferring data between password managers is a serious undertaking. Learn how to safely transfer data from LastPass to 1Password. The post appeared first on .
28-06-2022 17:41

Google Introduces New Capabilities for Cloud Armor Web Security Service
Google today announced a new set of features for Cloud Armor, its distributed denial-of-service (DDoS) mitigation service and web application firewall (WAF).
28-06-2022 17:00

Best ways to incorporate security into the software development life cycle
With the persistence of security issues in software development, there is an urgent need for software development companies to prioritize security in the software development life cycle. The post appeared first on .
28-06-2022 16:55

CISA Says 'PwnKit' Linux Vulnerability Exploited in Attacks
The US Cybersecurity and Infrastructure Security Agency (CISA) says a Linux vulnerability tracked as CVE-2021-4034 and PwnKit has been exploited in attacks.
28-06-2022 16:43

Cyolo Banks $60M Series B for ZTNA Technology
Cyolo, an Israeli startup building technology for zero trust networking, on Monday announced a new $60 million investment led by the venture investing arm of National Grid. In addition to National Grid Partners, Cyolo said it scored investments from Gli
28-06-2022 16:27

Cisco partnering with GDIT to provide private 5G to government agencies
The two companies announced their intention to bring Cisco’s private 5G solution to the public sector. The post appeared first on .
28-06-2022 14:58

Chinese Threat Actor Targets Rare Earth Mining Companies in North America, Australia
Mandiant’s security researchers have been tracking influence campaigns that a Chinese threat actor named Dragonbridge has been conducting against rare earth mining companies in Australia, Canada, and the United States.
28-06-2022 14:21

New Database Catalogs Cloud Vulnerabilities, Security Issues
Cloud security company Wiz has announced the launch of a new database whose goal is to keep track of vulnerabilities and other security issues affecting cloud services.
28-06-2022 13:01

Cyber-Physical Security: Benchmarking to Advance Your Journey
Operational resilience is a priority and organizations are decisive about protecting cyber-physical systems (CPS) in today's consolidated and converged reality
28-06-2022 12:27

Chinese Hackers Target Building Management Systems
Threat hunters at Kaspersky have uncovered a series of attacks that targeted organizations across telecoms, transportation, and industrial sectors with the ShadowPad backdoor. The campaign hit the manufacturing and telecoms industries in Afghanistan and
28-06-2022 12:23

LockBit 3.0 Ransomware Emerges With Bug Bounty Program
The LockBit 3.0 ransomware operation was launched recently and it includes a bug bounty program offering up to $1 million for vulnerabilities and various other types of information.
28-06-2022 11:06

New Bumblebee malware loader increasingly adopted by cyber threat groups
Conti, Quantum and Mountlocker were all linked to having used the new piece of software to inject systems with ransomware. The post appeared first on .
28-06-2022 10:00

ZuoRAT Malware Hijacking Home-Office Routers to Spy on Targeted Networks
A never-before-seen remote access trojan dubbed ZuoRAT has been singling out small office/home office (SOHO) routers as part of a sophisticated campaign targeting North American and European networks. The malware "grants the actor the ability to pivot
28-06-2022 08:38

Overview of Top Mobile Security Threats in 2022
Your smartphone is your daily companion. The chances are that most of our activities rely on them, from ordering food to booking medical appointments. However, the threat landscape always reminds us how vulnerable smartphones can be.  Consider the rec
28-06-2022 04:43

APT Hackers Targeting Industrial Control Systems with ShadowPad Backdoor
Entities located in Afghanistan, Malaysia, and Pakistan are in the crosshairs of an attack campaign that targets unpatched Microsoft Exchange Servers as an initial access vector to deploy the ShadowPad malware. Russian cybersecurity firm Kaspersky, wh
28-06-2022 04:30

OpenSSL to Release Security Patch for Remote Memory Corruption Vulnerability
The latest version of the OpenSSL library has been discovered as susceptible to a remote memory-corruption vulnerability on select systems. The issue has been identified in OpenSSL version 3.0.4, which was released on June 21, 2022, and impacts x64 sy
28-06-2022 02:16

New Android Banking Trojan 'Revive' Targeting Users of Spanish Financial Services
A previously unknown Android banking trojan has been discovered in the wild, targeting users of the Spanish financial services company BBVA. Said to be in its early stages of development, the malware — dubbed Revive by Italian cybersecurity firm Cleaf
28-06-2022 00:56

Cybersecurity Experts Warn of Emerging Threat of "Black Basta" Ransomware
The Black Basta ransomware-as-a-service (RaaS) syndicate has amassed nearly 50 victims in the U.S., Canada, the U.K., Australia, and New Zealand within two months of its emergence in the wild, making it a prominent threat in a short window. "Black Bas
27-06-2022 21:48

Lithuania Says Hit by Cyberattack, Russia 'Probably' to Blame
Lithuania said Monday it had been hit by an "intense" cyberattack, probably Russian, days after Moscow protested restrictions Vilnius imposed on the rail transit of certain goods to Kaliningrad.
27-06-2022 17:35

How to install and use the Bitwarden Chrome plugin
Jack Wallen explains why you should use the Bitwarden Chrome plugin and how it's done. The post appeared first on .
27-06-2022 15:45

NIST Releases New macOS Security Guidance for Organizations
The National Institute of Standards and Technology (NIST) has published the final version of its guidance on securing macOS endpoints and assessing their security.
27-06-2022 15:14

How to use Bitwarden on Android
Jack Wallen shows you how to get the most out of Bitwarden on Android with the Auto-fill feature. The post appeared first on .
27-06-2022 14:29

House Passes ICS Cybersecurity Training Bill
The US House of Representatives has passed a new cybersecurity bill named the “Industrial Control Systems Cybersecurity Training Act.”
27-06-2022 14:06

How to transfer LastPass to Bitwarden
Jack Wallen walks you through the process of migrating your password vault from LastPass to Bitwarden. The post appeared first on .
27-06-2022 13:54

Spyware vendor targets iOS and Android in Italy and Kazakhstan, collaborates with ISP
Some spyware vendors are collaborating with ISPs to ensure their targets are successfully compromised. Read more about how to protect yourself from similar threats. The post appeared first on .
27-06-2022 13:41

Cerby Emerges From Stealth With Security Platform for Unmanageable Apps
California-based company Cerby on Monday announced that it has emerged from stealth mode with a security platform for unmanageable applications, as well as $12 million in seed funding.
27-06-2022 13:02

FTC Takes Action Against CafePress Over Massive Data Breach, Cover-Up
The Federal Trade Commission (FTC) on Friday announced that it has finalized an order against CafePress, requiring it to improve its security posture following a cybersecurity incident that the company attempted to cover up.
27-06-2022 12:20

Netsec Goggle Customizes Brave Search Results to Show Only Cybersecurity Websites
Cybersecurity consulting firm Forces Unseen has developed a “Goggle” for the Brave search engine that allows users to obtain results only from cybersecurity websites.
27-06-2022 11:13

source : hackernews, securityweek, techrepublicsecurity, welivesecurity


Ads