New PowerDrop malware targets U.S. aerospace defense industry Researchers from the Adlumin Threat Research group warn that the PowerShell-based malware uses advanced techniques to evade…
All experienced security professionals were at one time very green. Entry level status means risk to your organization. That’s if you give them too much…
Google improves brand email authentication Brand impersonation with email is a tail as old as time. Last month, Google thought it cracked the nut with…
Microsoft to pay $20M settlement for illegally collecting children’s data Microsoft will pay $20 million to settle charges brought by the Federal Trade Commission for…
There is a long history of security professionals complaining about the insecurity of new technologies. When new technologies take off, they rarely have lots of…
Why is data classification such a critical keystone? “It helps you quantify where your risk is”, said Matt Radolec, sr. director incident response and cloud…
Xplain hack impacts Swiss cantonal police and Fedpol Swiss police are investigating a cyberattack that impacted the IT service provider Xplain, which provides services to…
Amazon Ring, Alexa accused of privacy violations by FTC America’s Federal Trade Commission on Wednesday charged, via the US Dept of Justice, two Amazon outfits…
Toyota finds more cloud leaks Earlier this year, Toyota disclosed that misconfigured servers resulted in it exposing location data on over two million customers for…
When cybersecurity needs to cut budget, first move is to look where you have redundancy. That way you’re not actually reducing the security effort. But…
New GobRAT remote access trojan targeting Linux routers in Japan This is a new Golang remote access trojan (RAT) called GobRAT. “Initially, the attacker targets…
Cyber Security Headlines – Week in Review, May 22-26, is hosted by Rich Stroffolino with our guest, Rich Greenberg, ISSA Distinguished Fellow and Honor Roll,…
Security professionals talk a lot about the reputational damage from breaches. And it seems logical, but major companies still do get breached and their reputation…
Google launches GUAC Back in October, Google announced a new open source initiative called Graph for Understanding Artifact Composition, or GUAC, in an effort to…
Here’s a preview video of the live audience recording of the CISO Series Podcast at the Rocky Mountain Information Security Conference (RMISC) in Denver. Joining…
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.