Australia Launches Commonwealth Cybersecurity Initiative
09
Jul
2024

Australia Launches Commonwealth Cybersecurity Initiative

Australian Home Affairs Secretary Stephanie Foster has initiated a new initiative across commonwealth agencies aimed at fortifying Commonwealth cybersecurity against…

Regional Transport Office (RTO) malware
09
Jul
2024

Indians Targeted By Regional Transport Office Scam

Cyble Research and Intelligence Labs (CRIL) researchers have observed a new campaign in which threat actors claiming to be from…

Trojanized jQuery Infiltrates npm, GitHub, and CDNs: Thousands of Packages at Risk
09
Jul
2024

Trojanized jQuery Threatens Thousands on npm, GitHub, and CDNs

Phylum uncovers large-scale trojanized jQuery attacks targeting npm, GitHub, and CDNs. Malicious actors steal user form data through a modified…

Jane Devry
09
Jul
2024

CISA Guidance Strengthens Data Security, Neglects Web Access Security

CISA’s recent guidance to shift from VPNs to SSE and SASE products strengthens data protections, but misses an opportunity to…

Hybrid cloud storage vs on-prem: What data goes where?
09
Jul
2024

Hybrid cloud storage vs on-prem: What data goes where?

For enterprises that want to extend their storage strategy, the public cloud is a place to start that can bring…

Hackerone logo
09
Jul
2024

What HackerOne Customers Say About Remediating Vulnerabilities and Getting the Best Results From Hackers

Remediating Vulnerabilities  Streamlining communication between hackers and security teams, HackerOne customers are able to quickly and thoroughly remediate vulnerabilities before…

Kryptonite Panda hackers
09
Jul
2024

Chinese APT40 hackers hijack SOHO routers to launch attacks

A joint advisory from international cybersecurity agencies and law enforcement warns of the tactics used by the Chinese state-sponsored APT…

Jane Devry
09
Jul
2024

Catch My Drift? How To Easily Manage Configuration Drift In Your Storage & Backup Systems

Configuration drift happens when the configurations of storage & backup systems and software deviate from a baseline or standard configuration…

Critical vulnerability in the RADIUS protocol leaves networking equipment open to attack
09
Jul
2024

Critical vulnerability in the RADIUS protocol leaves networking equipment open to attack

A new critical security vulnerability in the RADIUS protocol, dubbed BlastRADIUS, leaves most networking equipment open to Man-in-the-Middle (MitM) attacks….

Ticketmaster logo
09
Jul
2024

Ticketmaster says stolen Taylor Swift Eras Tour tickets are useless

While cybercriminals are offering free tickets to Taylor Swift Eras Tour and other events, Ticketmaster is telling would-be purchasers that…

Lessons from war: How Israel is fighting Iranian state-backed hacking
09
Jul
2024

Lessons from war: How Israel is fighting Iranian state-backed hacking

Hamas hacked into video streams from private security cameras in Israeli homes to gather intelligence before fighters descended on Israeli…

Evolve Bank
09
Jul
2024

Evolve Bank says data breach impacts 7.6 million Americans

Evolve Bank & Trust (Evolve) is sending notices of a data breach to 7.6 million Americans whose data was stolen…