Author: Cybernoz

Ascon Cryptographic Algorithm for IoT
08
Feb
2023

NIST Standardizes Ascon Cryptographic Algorithm for IoT and Other Lightweight Devices

Feb 08, 2023Ravie LakshmananEncryption / IoT Security The U.S. National Institute of Standards and Technology (NIST) has announced that a…

Security Think Tank: Poor training is worse than no training at all
08
Feb
2023

Security Think Tank: Poor training is worse than no training at all

A change is underway in security training of all kinds. Security managers are being asked to step up and make…

Dota 2
08
Feb
2023

Malicious Dota 2 game modes infected players with malware

Security researchers have discovered four malicious Dota 2 game modes that were used by a threat actor to backdoor the players’ systems….

Second UK Computer Misuse Act consultation reflects ‘very little progress’
08
Feb
2023

Second UK Computer Misuse Act consultation reflects ‘very little progress’

Campaigner bemoans glacial progress of review and urges government to set clear timetable A review of the UK’s creaking cybercrime…

Researcher Hacked Toyota's Global Supplier Portal
08
Feb
2023

Researcher Hacked Toyota’s Global Supplier Portal

The Global Supplier Preparation Information Management System, or GSPIMS, of Toyota, was breached by a security researcher using a backdoor….

How to Use Cloud Access Security Brokers for Data Protection
08
Feb
2023

How to Use Cloud Access Security Brokers for Data Protection

A cloud access security broker is a security policy enforcement point that can be located on-premises or in the cloud….

Analysis: Could NIST’s Cybersecurity Framework 2.0 be the beginning of international best practice?
08
Feb
2023

Analysis: Could NIST’s Cybersecurity Framework 2.0 be the beginning of international best practice?

[ This article was originally published here ] By John E. Dunn  It’s been nearly seven years since the 1.1…

Document Management Systems
08
Feb
2023

Unpatched Security Flaws Disclosed in Multiple Document Management Systems

Feb 08, 2023Ravie LakshmananVulnerability Management Multiple unpatched security flaws have been disclosed in open source and freemium Document Management System…

Prolific social media fraudster jailed for three years
08
Feb
2023

Prolific social media fraudster jailed for three years

A prolific cyber criminal who used encrypted social media platform Telegram in a series of long-running frauds has been sentenced…

Italian Winery Cantina Tollo, The Latest Victim of Cyber Attack
08
Feb
2023

Italian Winery Cantina Tollo, The Latest Victim of Cyber Attack

Premier Italian winery Cantina Tollo has disclosed a malicious cyber attack. The announcement came close on the  heels of LockBit…

08
Feb
2023

Optus scammer avoids jail – Security

The man who tried to extort money from customers affected by the Optus data breach has avoided a jail sentence….

Edge on a rainbow background
08
Feb
2023

Microsoft Edge will switch to Adobe Acrobat’s PDF rendering engine

Microsoft and Adobe have partnered to integrate the Adobe Acrobat PDF rendering engine directly into the Edge browser, replacing the…