26
Dec
2022

#MIWIC2022: Dr Kiri Addison, Mimecast

Organised by Eskenzi PR in media partnership with the IT Security Guru, the Most Inspiring Women in Cyber Awards aim…

New Ransom Payment Schemes Target Executives, Telemedicine – Krebs on Security
26
Dec
2022

New Ransom Payment Schemes Target Executives, Telemedicine – Krebs on Security

Ransomware groups are constantly devising new methods for infecting victims and convincing them to pay up, but a couple of…

26
Dec
2022

Elon Musk and the Dangers of Censoring Real-Time Flight Trackers

I woke up Friday morning to the message I’d been expecting: “Your account, @Justin_Ling has been locked for violating the Twitter…

NIST announced that it is time to stop using Secure Hash Technique-1 (SHA-1), a 27 year old vulnerable encryption algorithm
26
Dec
2022

NIST announced that it is time to stop using Secure Hash Technique-1 (SHA-1), a 27 year old vulnerable encryption algorithm

The National Institute of Standards and Technology (NIST) in the United States has announced that it is time to stop…

Career Profile: Anand Prasad, Deloitte
26
Dec
2022

Career Profile: Anand Prasad, Deloitte

Name: Anand Prasad Affiliation: Deloitte Editor of Cybersecurity Magazine Can you briefly introduce your current role in cybersecurity? My role…

KmsdBot Botnet
26
Dec
2022

KmsdBot Botnet Suspected of Being Used as DDoS-for-Hire Service

Dec 20, 2022Ravie LakshmananServer Security / Cyber Attacks An ongoing analysis of the KmsdBot botnet has raised the possibility that…

26
Dec
2022

WDF Sound – wdf.exe – Program Information

Disclaimer It is assumed that users are familiar with the operating system they are using and comfortable with making the…

Vice Ransomware Group
26
Dec
2022

Vice Ransomware Group Uses Custom Ransomware

Cybersecurity analysts at SentinelOne security firm have recently identified that the Vice Society ransomware gang has switched to custom ransomware…

John Jackson, pen tester, Trustwave
26
Dec
2022

How to become a penetration tester: Part 2 – ‘Mr Hacking’ John Jackson on the virtue of ‘endless curiosity’

Marine Corps engineer-turned offensive security expert offers careers advice and his best and worst experiences John Jackson has been working…

26
Dec
2022

#MIWIC2022: Camilla Currin, Trend Micro

Organised by Eskenzi PR in media partnership with the IT Security Guru, the Most Inspiring Women in Cyber Awards aim…

FBI’s Vetted Info Sharing Network ‘InfraGard’ Hacked – Krebs on Security
26
Dec
2022

FBI’s Vetted Info Sharing Network ‘InfraGard’ Hacked – Krebs on Security

InfraGard, a program run by the U.S. Federal Bureau of Investigation (FBI) to build cyber and physical threat information sharing…

26
Dec
2022

Iran’s Internet Blackouts Are Sabotaging Its Own Economy

As internet shutdowns, platform blocking, and content filtering become increasingly common levers for authoritarian control around the world, Iran has…