Cloud Engineer Sentenced for Deleting Ex-employer’s Code Logs
13
Dec
2023

Cloud Engineer Sentenced for Deleting Ex-employer’s Code Logs

San Francisco resident Miklos Daniel Brody, 38, took revenge on his former employer, a bank, by hacking valuable computer code and damaging…

SAFE Materiality Assessment Module identifies top cyber risk scenarios
13
Dec
2023

SAFE Materiality Assessment Module identifies top cyber risk scenarios

Safe Security announced its new SAFE Materiality Assessment Module, enabling security and risk leaders to achieve SEC compliance by estimating…

Clang Sanitizers
13
Dec
2023

Google Using Clang Sanitizers to Protect Android Against Cellular Baseband Vulnerabilities

Dec 13, 2023NewsroomMobile Communication / Firmware security Google is highlighting the role played by Clang sanitizers in hardening the security…

No UK AI legislation until timing is right, says Donelan
13
Dec
2023

No UK AI legislation until timing is right, says Donelan

Digital secretary Michelle Donelan says UK government will not legislate on artificial intelligence (AI) until the timing is right, and…

OAuth apps used in cryptocurrency mining, phishing campaigns, and BEC attacks
13
Dec
2023

OAuth apps used in cryptocurrency mining, phishing campaigns, and BEC attacks

OAuth apps used in cryptocurrency mining, phishing campaigns, and BEC attacks Pierluigi Paganini December 13, 2023 Microsoft warns that threat…

New Sophisticated Phishing Attacks on the Rise
13
Dec
2023

New Sophisticated Phishing Attacks on the Rise

Phishing, a persistent cyberthreat, has evolved with the times. Once a symbol of convenience, QR codes are now being weaponized…

Attackers abuse OAuth apps to initiate large-scale cryptomining and spam campaigns
13
Dec
2023

Attackers abuse OAuth apps to initiate large-scale cryptomining and spam campaigns

Attackers are compromising high-privilege Microsoft accounts and abusing OAuth applications to launch a variety of financially-motivated attacks. Abusing OAuth applications…

Recruiters Beware! Hackers Deliver Malware Posing Job Applicant
13
Dec
2023

Recruiters Beware! Hackers Deliver Malware Posing Job Applicant

Threat actors have been targeting recruiters disguised as job applicants to deliver their malware. Though this method is not unique,…

Sophos Firewall Code Injection Flaw: Let Attackers Execute Code
13
Dec
2023

Sophos Firewall Code Injection Flaw: Let Attackers Execute Code

A critical security flaw has been discovered in the Sophos Firewall User Portal and Webadmin, allowing hackers to execute malicious…

Drata unveils Third-Party Risk Management offering to help security teams identify risks
13
Dec
2023

Drata unveils Third-Party Risk Management offering to help security teams identify risks

Drata announced its Third-Party Risk Management (TPRM) offering, empowering customers to identify, evaluate, and monitor third-party risks in one centralized…

How ransomware gangs use the tech media against their victims
13
Dec
2023

How ransomware gangs use the tech media against their victims

Cyber criminals traditionally and understandably shied away from publicity, but over the past few years, ransomware gangs have inverted this…

Hackers Abuse OAuth Applications to Automated Finacial Attacks
13
Dec
2023

Hackers Abuse OAuth Applications to Automated Finacial Attacks

OAuth (Open Authorization) is an industry-standard protocol that allows third-party applications to access a user’s data without exposing login credentials. …