Uggh, just saying “zero trust” sends shivers down security professionals’ spines. The term is fraught with so many misnomers. The most important is who are…
Google closes on Mandiant Back in March, Google announced it intended to acquire the threat intelligence firm Mandiant in a $5.4 billion deal. This came…
Ransomware gangs switching to new intermittent encryption tactic A growing number of ransomware groups are adopting a new tactic that helps them encrypt their victims’…
This week’s Cyber Security Headlines – Week in Review, June 6-10, is hosted by Rich Stroffolino with our guest, Jason Elrod, CISO, Multicare Health System…
China accuses US of cyberattacks and cyberespionage On Monday, the Chinese National Computer Virus Emergency Response Center (CVERC) published a report, co-authored by the private…
Please join us on Friday September 30th, 2022 for Super Cyber Friday. Our topic of discussion will be “Hacking the CISO Series: We’re turning four…
Hiring managers speak about looking for culture fit and diversity, but never at the same time. Can they coexist? Are they mutually exclusive? Check out…
CISA asks for feedback on reporting rules Back in March, President Biden signed a new law requiring critical infrastructure owners and operators to report major…
Please join us on Friday, September 23rd, 2022 for Super Cyber Friday. Our topic of discussion will be “Hacking Phishing: An hour of critical thinking…
Transnational sextortion ring dismantled Interpol’s cybercrime division worked with police in Singapore and Hong Kong to take down the operation. The police agency arrested 12…
Federal agencies share supply chain security tips On Thursday, the National Security Agency (NSA) and the Cybersecurity and Infrastructure Security Agency (CISA) released tips for…
Google launches open-source bug bounty Google launched the Open Source Software Vulnerability Rewards Program. This will pay up to $31,337 for bugs on open-source projects…
Google Translate app is actually Windows crypto-mining malware Someone is spreading cryptocurrency-mining malware disguised as legitimate-looking applications such as Google Translate, on free software download…
Microsoft warns Iranians using Log4Shell According to a new report from the Redmond giant, the Iranian group MuddyWater continues to target Israeli organizations using the…
Hackers breach LastPass developer system to steal source code Password management service LastPass has confirmed a security incident that resulted in the theft of certain…
This week’s Cyber Security Headlines – Week in Review, June 6-10, is hosted by Rich Stroffolino with our guest, John McClure, CISO, Sinclair Broadcast Group…
North Korean malware present at Black Hat IronNet, a security firm hired to assist at Black Hat’s Network Operations Center discovered several active malware infections…
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.