News
Putin threatens supply chains with counter-sanction order
Russian president Vladimir Putin has authorized retaliatory sanctions against individuals and organizations that have taken action over the illegal invasion of Ukraine.…
Cyber-spies target Microsoft Exchange to steal M&A info
A cyber-spy group is targeting Microsoft Exchange deployments to steal data related to mergers and acquisitions and large corporate transactions, according to Mandiant.…
SEC nearly doubles cryptocurrency cop roles in special cyber unit
The US Securities and Exchange Commission intends to fill an additional 20 positions in a special unit that polices cryptocurrency fraud and other cybercrimes.…
Zero trust is more than just vendors and products – it requires process
Dell Technologies World Zero-trust architectures have become a focus for enterprises trying to figure out how to secure an IT environment where data and applications are increasingly distributed outside of the traditional perimeter defenses of central datacenters.…
Microsoft's standalone Defender for Business hits GA
Microsoft has made a standalone version of Microsoft Defender for Business generally available, aimed at customers not keen on paying for one of its subscriptions.…
Critical vulnerabilities found in 'millions of Aruba and Avaya switches'
Five critical remote code execution vulnerabilities in millions Aruba and Avaya devices can be exploited by cybercriminals to take full control of network switches commonly used in airports, hospitals, and hotels, according to Armis researchers.…
Privacy pathology: It's time for the users to gather a little data. Evidence
Opinion Almost exactly a month ago, we noted a splendid piece of academic research into Google's data-gathering and consent practises.…
Google starts testing fenced frames to guard its Privacy Sandbox
Google in the next few days plans to begin testing fenced frames, a proposed web API to help its Privacy Sandbox ad technologies meet commitments to privacy of a sort.…
Security is a pain for American Dental Association: Ransomware infection feared
In brief The Black Basta crime gang has claimed it infected the American Dental Association with ransomware.…
SSE kicks the ‘A’ out of SASE
Analysis The emergence of secure access service edge (SASE) dominated the networking market for the last few years as enterprises sought to address increasingly distributed IT environments.…
Dell brings data recovery tools to Apex and the cloud
LAS VEGAS – Dell is giving enterprises new ways to protect the data they store in public clouds.…
Spanish PM, defense minister latest Pegasus spyware victims
Spain's prime minister and defense minister are the latest elected officials to detect Pegasus spyware on their mobile phones, according to multiple media reports quoting Spanish authorities.…
Facebook's Meta, tracking code, and the student financial aid website
Meta's Facebook subsidiary has been collecting hashed personal data from students seeking US government financial aid, even from those without a Facebook account and those not logged into the student aid website, according to a research study published this week.…
Data-wiper malware strains surge as Ukraine battles ongoing invasion
Security researchers have detailed six significant strains of data-wiping malware that have emerged in just the first quarter of 2022, a huge surge over previous years.…
Microsoft Edge's 'Secure Network' sounds a lot like a built-in VPN
Microsoft appears to be planning a VPN-like solution for its Edge browser judging by a support page for the upcoming feature.…
Don’t expect to get your data back from the Onyx ransomware group
Ransomware groups in recent years have ramped up the threats against victims to incentivize them to pay the ransom in return for their stolen and encrypted data. But a new crew is essentially destroying files larger than 2MB, so data in those files is lost even if the ransom is paid.…
Interpol: We can't arrest our way out of cybercrime
As cybercriminals become more sophisticated and their attacks more destructive and costly, private security firms and law enforcement need to work together, according to Interpol's Doug Witschi.…
India gives local techies 60 days to hit 6-hour deadline for infosec incident reporting
India's Computer Emergency Response Team (CERT-In) has given many of the nation's IT shops a big job that needs to be done in a hurry: complying with a new set of rules that require organizations to report 20 different types of infosec incidents within six hours of detection, be they a ransomware attack or mere compromise of a social media account.…
Sina Weibo, China's Twitter analogue, reveals users' locations and IP addresses
To the surprise of many users, China's largest Twitter-esque microblogging website, Sina Weibo, announced on Thursday that it will publish users' IP addresses and location data in an effort to keep their content honest and nice.…
Bumblebee malware loader emerges as Conti's BazarLoader fades
A sophisticated malware loader dubbed Bumblebee is being used by at least three cybercriminal groups that have links to ransomware gangs, according to cybersecurity researchers.…
Pages
