How Secure Communication Can Enhance Your Organization’s Cyber Defence
29
Jun
2023

How Secure Communication Can Enhance Your Organization’s Cyber Defence

By Luca Rognoni, Chief Security Officer and Co-Founder, YEO Messaging Cyber threat landscape has dramatically expanded in recent years due…

Honeywell MOVEit Hackers
29
Jun
2023

A new Infostealer Malware Steal BIOS & Hardware Data

Cybersecurity researchers at FortiGuard Labs recently found an unseen infostealer dubbed “ThirdEye” that is mainly crafted to steal several information…

The 2023 State of Ransomware: A Resurgence Is Brewing
29
Jun
2023

The 2023 State of Ransomware: A Resurgence Is Brewing

By Bob Maley, CSO at Black Kite After last year’s good fight against ransomware gangs, CISOs thought they won. Overall…

Preventing sophisticated phishing attacks aimed at employees
29
Jun
2023

Stories from the SOC: Fighting back against credential harvesting with ProofPoint

[ This article was originally published here ] Executive summary is a technique that hackers use to gain unauthorized access…

Iran's MuddyWater Evolves with a New Cyber Weapon
29
Jun
2023

Iran’s MuddyWater Evolves with a New Cyber Weapon

Jun 29, 2023Ravie Lakshmanan The Iranian state-sponsored group dubbed MuddyWater has been attributed to a previously unseen command-and-control (C2) framework…

IT Sustainability Think Tank: Carbon accounting and the changing regulatory landscape
29
Jun
2023

IT Sustainability Think Tank: Making sense of the changing green IT regulatory landscape

ESG [Environment, Social and Governance] is everyone’s favourite new acronym, working as a catch-them-all for climate action, worker rights, social…

SecurityWeek talks to Ann Dunkin, CIO at the Department of Energy
29
Jun
2023

DOE CIO Talks to SecurityWeek About Cybersecurity, Digital Transformation

Ann Dunkin is CIO at the US Department of Energy (DOE). Among her responsibilities, she heads IT and oversees cybersecurity….

List
29
Jun
2023

MITRE releases new list of top 25 most dangerous software bugs

MITRE shared today this year’s list of the top 25 most dangerous weaknesses plaguing software during the previous two years….

NSA and CISA Shared Best Practices To Harden CI/CD Cloud Deployments
29
Jun
2023

NSA and CISA Shared Practices To CI/CD Cloud Deployments

Released by the National Security Agency (NSA) and the Cybersecurity and Infrastructure Security Agency (CISA), the cybersecurity information sheet (CSI)…

Honeywell MOVEit Hackers
29
Jun
2023

Charming Kitten APT Group Uses Spear-phishing Methods

Charming Kitten APT Group Uses Innovative Spear-phishing Methods. Volexity researchers recently noticed that threat actors are actively intensifying their efforts…

Securing Healthcare Data Warehouses: Best Practices for Data Security and Privacy
29
Jun
2023

Securing Healthcare Data Warehouses: Best Practices for Data Security and Privacy

Securing the healthcare data warehouses themselves is equally vital to ensure the software applications’ security in their development and maintenance….

NHS England signs five-year Microsoft 365 contract
29
Jun
2023

NHS England signs five-year Microsoft 365 contract

NHS England has signed a five-year deal that will see the Microsoft 365 cloud-based online productivity suite of services rolled…