❌

Normal view

There are new articles available, click to refresh the page.
Before yesterdayCISO2CISO.COM & CYBER SECURITY GROUP

NSA: State-backed attackers are not after your data β€” they’re targeting CI – Source: securityboulevard.com

nsa:-state-backed-attackers-are-not-after-your-data-β€”-they’re-targeting-ci-–-source:-securityboulevard.com

Source: securityboulevard.com – Author: Paul Roberts Companies in the crosshairs of advanced persistent threat (APT) actors look at data theft not as a primary objective of hacking crews backed by Russia, China and Iran β€” but rather as a means to an end, the U.S. National Security Agency (NSA) told attendees at the annual RSA […]

La entrada NSA: State-backed attackers are not after your data β€” they’re targeting CI – Source: securityboulevard.com se publicΓ³ primero en CISO2CISO.COM & CYBER SECURITY GROUP.

Massive Online Shopping Scam Racks Up 850,000 Victims – Source: securityboulevard.com

massive-online-shopping-scam-racks-up-850,000-victims-–-source:-securityboulevard.com

Source: securityboulevard.com – Author: Jeffrey Burt A group of bad actors β€” likely from China β€” is running a global cybercrime-as-a-service operation. It oversees a massive network of fake shopping websites that has conned more than 850,000 people in the United States and Europe into purchasing items, over the past three years, and the organization […]

La entrada Massive Online Shopping Scam Racks Up 850,000 Victims – Source: securityboulevard.com se publicΓ³ primero en CISO2CISO.COM & CYBER SECURITY GROUP.

USENIX Security ’23 – SMACK: Semantically Meaningful Adversarial Audio Attack – Source: securityboulevard.com

usenix-security-’23-–-smack:-semantically-meaningful-adversarial-audio-attack-–-source:-securityboulevard.com

Source: securityboulevard.com – Author: Marc Handelman Security Bloggers NetworkΒ  Home Β» Security Bloggers Network Β» USENIX Security ’23 – SMACK: Semantically Meaningful Adversarial Audio Attack by Marc Handelman on May 9, 2024 Authors/Presenters: Zhiyuan Yu, Yuanhaur Chang, Ning Zhang, Chaowei Xiao Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and […]

La entrada USENIX Security ’23 – SMACK: Semantically Meaningful Adversarial Audio Attack – Source: securityboulevard.com se publicΓ³ primero en CISO2CISO.COM & CYBER SECURITY GROUP.

The Road to CTEM, Part 1: The Role of Validation – Source: securityboulevard.com

the-road-to-ctem,-part-1:-the-role-of-validation-–-source:-securityboulevard.com

Source: securityboulevard.com – Author: SafeBreach Continuous threat exposure management (CTEM) is a formal program to manage cyber risk that allows organizations to enhance and optimize their overall cybersecurity posture. As outlined by Gartner, CTEM offers a cyclical approach to finding and mitigating threat exposureβ€”which is the accessibility and exploitability of digital and physical assetsβ€”in an […]

La entrada The Road to CTEM, Part 1: The Role of Validation – Source: securityboulevard.com se publicΓ³ primero en CISO2CISO.COM & CYBER SECURITY GROUP.

Recent Breaches in Israel and Iran: A Closer Look at Cybersecurity Vulnerabilities – Source: securityboulevard.com

recent-breaches-in-israel-and-iran:-a-closer-look-at-cybersecurity-vulnerabilities-–-source:-securityboulevard.com

Source: securityboulevard.com – Author: Alberto Casares In recent times, Israel and Iran have been caught up in a series of conflicts and tensions, both on the geopolitical stage and in cyberspace posing significant challenges to regional stability but have also made both nations targets for cybersecurity vulnerabilities. As tensions intensify, so does the risk of […]

La entrada Recent Breaches in Israel and Iran: A Closer Look at Cybersecurity Vulnerabilities – Source: securityboulevard.com se publicΓ³ primero en CISO2CISO.COM & CYBER SECURITY GROUP.

Make WAAP Interesting Again by Quantifying Operational Efficiency and Secure by Design. – Source: securityboulevard.com

make-waap-interesting-again-by-quantifying-operational-efficiency-and-secure-by-design-–-source:-securityboulevard.com

Source: securityboulevard.com – Author: SecureIQLab The adoption of the cloud is the biggest driver of the DevOps development process. Before cloud, waterfall (80’s to late 90’s) and agile (2000 to late 2000’s) were the most prominent development processes. Each re-enforces their own specific application architecture, namely N-Tier and Monolithic. Each required very specific kinds of […]

La entrada Make WAAP Interesting Again by Quantifying Operational Efficiency and Secure by Design. – Source: securityboulevard.com se publicΓ³ primero en CISO2CISO.COM & CYBER SECURITY GROUP.

Getting Started with Software Dependency Management – Source: securityboulevard.com

getting-started-with-software-dependency-management-–-source:-securityboulevard.com

Source: securityboulevard.com – Author: Rhys Arkins Dependency management is a broad topic encompassing, among other things, keeping an inventory of dependencies, removing unused dependencies, and fixing conflicts between dependencies. In this article, we will focus on one large part of software dependency management that devs can do easily and with great results: updating dependencies. Why […]

La entrada Getting Started with Software Dependency Management – Source: securityboulevard.com se publicΓ³ primero en CISO2CISO.COM & CYBER SECURITY GROUP.

NASA Must Improve Spacecraft Cybersecurity, GAO Report Finds – Source: securityboulevard.com

nasa-must-improve-spacecraft-cybersecurity,-gao-report-finds-–-source:-securityboulevard.com

Source: securityboulevard.com – Author: Nathan Eddy Houston, we may have a problem. NASA’s cybersecurity framework for spacecraft development is inconsistent and must be improved, according to a 34-page review by the U.S. Government Accountability Office (GAO). The GAO report highlighted the need for mandatory cybersecurity updates throughout the space agency’s $83 billion space development project […]

La entrada NASA Must Improve Spacecraft Cybersecurity, GAO Report Finds – Source: securityboulevard.com se publicΓ³ primero en CISO2CISO.COM & CYBER SECURITY GROUP.

A Practical Approach to FAIR Cyber Risk Quantification – Source: securityboulevard.com

a-practical-approach-to-fair-cyber-risk-quantification-–-source:-securityboulevard.com

Source: securityboulevard.com – Author: Maahnoor Siddiqui In the ever-evolving world of cybersecurity, managing risk is no longer about simply setting up firewalls and antivirus software. As cyber threats become more sophisticated, organizations require a robust and comprehensive framework to understand and quantify risk in monetary terms. This is where the Factor Analysis of Information Risk […]

La entrada A Practical Approach to FAIR Cyber Risk Quantification – Source: securityboulevard.com se publicΓ³ primero en CISO2CISO.COM & CYBER SECURITY GROUP.

BSidesSF 2024: A Community Event Anchored To Hope For The Future Of Security – Source: securityboulevard.com

bsidessf-2024:-a-community-event-anchored-to-hope-for-the-future-of-security-–-source:-securityboulevard.com

Source: securityboulevard.com – Author: Dwayne McDaniel You can’t see The Golden Gate Bridge from downtown San Francisco, but if you stand at the right intersections, you can see The San Francisco-Oakland Bay Bridge. While not as famous as its ocean-facing sister, the Bay Bridge, as most people call it, carries almost twice the number of […]

La entrada BSidesSF 2024: A Community Event Anchored To Hope For The Future Of Security – Source: securityboulevard.com se publicΓ³ primero en CISO2CISO.COM & CYBER SECURITY GROUP.

FBI warns US retailers that hackers are targeting their gift card systems – Source: www.tripwire.com

fbi-warns-us-retailers-that-hackers-are-targeting-their-gift-card-systems-–-source:-wwwtripwire.com

Source: www.tripwire.com – Author: Graham Cluley The FBI has issued a warning to US retailers about a financially-motivated malicious hacking ring that has been targeting employees with phishing attacks in an attempt to create fraudulent gift cards. Staff at the corporate offices of US retail companies have been the target of highly-sophisticated email phishing and […]

La entrada FBI warns US retailers that hackers are targeting their gift card systems – Source: www.tripwire.com se publicΓ³ primero en CISO2CISO.COM & CYBER SECURITY GROUP.

$10 million reward offer for apprehension of unmasked LockBit ransomware leader – Source: www.exponential-e.com

$10-million-reward-offer-for-apprehension-of-unmasked-lockbit-ransomware-leader-–-source:-wwwexponential-e.com

Source: www.exponential-e.com – Author: Graham Cluley Do you know Dmitry Yuryevich Khoroshev? If you do, there’s a chance that you might well on the way to receiving a reward of up to $10 million. Law enforcement agencies across the US, UK, and Australia have named Dmitry Yuryevich Khoroshev as the mastermind behind the notorious LockBit […]

La entrada $10 million reward offer for apprehension of unmasked LockBit ransomware leader – Source: www.exponential-e.com se publicΓ³ primero en CISO2CISO.COM & CYBER SECURITY GROUP.

Boeing refused to pay $200 million LockBit ransomware demand – Source: www.bitdefender.com

boeing-refused-to-pay-$200-million-lockbit-ransomware-demand-–-source:-wwwbitdefender.com

Source: www.bitdefender.com – Author: Graham Cluley Boeing has confirmed that it received a demand for a massive $200 million after a ransomware attack by the notorious LockBit hacking group in October 2023. The company confirmed its link to the indictment of Dmitry Yuryevich Khoroshev, who was identified this week by the US Department of Justice […]

La entrada Boeing refused to pay $200 million LockBit ransomware demand – Source: www.bitdefender.com se publicΓ³ primero en CISO2CISO.COM & CYBER SECURITY GROUP.

Researchers Uncover β€˜LLMjacking’ Scheme Targeting Cloud-Hosted AI Models – Source:thehackernews.com

researchers-uncover-β€˜llmjacking’-scheme-targeting-cloud-hosted-ai-models-–-source:thehackernews.com

Source: thehackernews.com – Author: . ξ ‚May 10, 2024ξ „NewsroomVulnerability / Cloud Security Cybersecurity researchers have discovered a novel attack that employs stolen cloud credentials to target cloud-hosted large language model (LLM) services with the goal of selling access to other threat actors. The attack technique has been codenamed LLMjacking by the Sysdig Threat Research Team. β€œOnce […]

La entrada Researchers Uncover β€˜LLMjacking’ Scheme Targeting Cloud-Hosted AI Models – Source:thehackernews.com se publicΓ³ primero en CISO2CISO.COM & CYBER SECURITY GROUP.

Malicious Android Apps Pose as Google, Instagram, WhatsApp to Steal Credentials – Source:thehackernews.com

malicious-android-apps-pose-as-google,-instagram,-whatsapp-to-steal-credentials-–-source:thehackernews.com

Source: thehackernews.com – Author: . Malicious Android apps masquerading as Google, Instagram, Snapchat, WhatsApp, and X (formerly Twitter) have been observed to steal users’ credentials from compromised devices. β€œThis malware uses famous Android app icons to mislead users and trick victims into installing the malicious app on their devices,” the SonicWall Capture Labs threat research […]

La entrada Malicious Android Apps Pose as Google, Instagram, WhatsApp to Steal Credentials – Source:thehackernews.com se publicΓ³ primero en CISO2CISO.COM & CYBER SECURITY GROUP.

What’s the Right EDR for You? – Source:thehackernews.com

what’s-the-right-edr-for-you?-–-source:thehackernews.com

Source: thehackernews.com – Author: . A guide to finding the right endpoint detection and response (EDR) solution for your business’ unique needs. Cybersecurity has become an ongoing battle between hackers and small- and mid-sized businesses. Though perimeter security measures like antivirus and firewalls have traditionally served as the frontlines of defense, the battleground has shifted […]

La entrada What’s the Right EDR for You? – Source:thehackernews.com se publicΓ³ primero en CISO2CISO.COM & CYBER SECURITY GROUP.

Chrome Zero-Day Alert β€” Update Your Browser to Patch New Vulnerability – Source:thehackernews.com

chrome-zero-day-alert-β€”-update-your-browser-to-patch-new-vulnerability-–-source:thehackernews.com

Source: thehackernews.com – Author: . ξ ‚May 10, 2024ξ „NewsroomBrowser Security / Vulnerability Google on Thursday released security updates to address a zero-day flaw in Chrome that it said has been actively exploited in the wild. Tracked as CVE-2024-4671, the high-severity vulnerability has been described as a case of use-after-free in the Visuals component. It was reported […]

La entrada Chrome Zero-Day Alert β€” Update Your Browser to Patch New Vulnerability – Source:thehackernews.com se publicΓ³ primero en CISO2CISO.COM & CYBER SECURITY GROUP.

CensysGPT: AI-Powered Threat Hunting for Cybersecurity Pros (Webinar) – Source:thehackernews.com

censysgpt:-ai-powered-threat-hunting-for-cybersecurity-pros-(webinar)-–-source:thehackernews.com

Source: thehackernews.com – Author: . ξ ‚May 10, 2024ξ „The Hacker NewsArtificial Intelligence / Threat Hunting Artificial intelligence (AI) is transforming cybersecurity, and those leading the charge are using it to outsmart increasingly advanced cyber threats. Join us for an exciting webinar, β€œThe Future of Threat Hunting is Powered by Generative AI,” where you’ll explore how AI […]

La entrada CensysGPT: AI-Powered Threat Hunting for Cybersecurity Pros (Webinar) – Source:thehackernews.com se publicΓ³ primero en CISO2CISO.COM & CYBER SECURITY GROUP.

North Korean Hackers Deploy New Golang Malware β€˜Durian’ Against Crypto Firms – Source:thehackernews.com

north-korean-hackers-deploy-new-golang-malware-β€˜durian’-against-crypto-firms-–-source:thehackernews.com

Source: thehackernews.com – Author: . ξ ‚May 10, 2024ξ „NewsroomMalware / Cyber Espionage The North Korean threat actor tracked as Kimsuky has been observed deploying a previously undocumented Golang-based malware dubbed Durian as part of highly-targeted cyber attacks aimed at two South Korean cryptocurrency firms. β€œDurian boasts comprehensive backdoor functionality, enabling the execution of delivered commands, additional […]

La entrada North Korean Hackers Deploy New Golang Malware β€˜Durian’ Against Crypto Firms – Source:thehackernews.com se publicΓ³ primero en CISO2CISO.COM & CYBER SECURITY GROUP.

Cybersecurity in a Race to Unmask a New Wave of AI-Borne Deepfakes – Source: www.darkreading.com

cybersecurity-in-a-race-to-unmask-a-new-wave-of-ai-borne-deepfakes-–-source:-wwwdarkreading.com

Source: www.darkreading.com – Author: Kelly Jackson Higgins, Editor-in-Chief, Dark Reading Source: Alfonso Fabiio Iozzino via Alamy Stock Photo RSA CONFERENCE 2024 – San Francisco – Everyone’s talking about deepfakes, but the majority of AI-generated synthetic media circulating today will seem quaint in comparison to the sophistication and volume of what’s about to come. Kevin Mandia, […]

La entrada Cybersecurity in a Race to Unmask a New Wave of AI-Borne Deepfakes – Source: www.darkreading.com se publicΓ³ primero en CISO2CISO.COM & CYBER SECURITY GROUP.

Dark Reading β€˜Drops’ Its First Podcast – Source: www.darkreading.com

dark-reading-β€˜drops’-its-first-podcast-–-source:-wwwdarkreading.com

Source: www.darkreading.com – Author: Kelly Jackson Higgins, Editor-in-Chief, Dark Reading Source: aleksandr Lychagin via Alamy Stock Photo At one of the first meetings Dark Reading held with its inaugural CISO Advisory Board last year, one of the questions a couple members of the board asked us was, β€œWhy doesn’t Dark Reading have a podcast?” The […]

La entrada Dark Reading β€˜Drops’ Its First Podcast – Source: www.darkreading.com se publicΓ³ primero en CISO2CISO.COM & CYBER SECURITY GROUP.

You’ve Been Breached: What Now? – Source: www.darkreading.com

you’ve-been-breached:-what-now?-–-source:-wwwdarkreading.com

Source: www.darkreading.com – Author: Jackson Shaw Jackson Shaw, Chief Security Officer, Clear Skye May 10, 2024 4 Min Read Source: Brain light via Alamy Stock Photo COMMENTARY Prevention: It’s the word we hear most when discussing cybersecurity. We read articles and hear experts speak about attack prevention or carelessness that leads to data compromises. In […]

La entrada You’ve Been Breached: What Now? – Source: www.darkreading.com se publicΓ³ primero en CISO2CISO.COM & CYBER SECURITY GROUP.

Dark Reading Confidential: The CISO and the SEC – Source: www.darkreading.com

dark-reading-confidential:-the-ciso-and-the-sec-–-source:-wwwdarkreading.com

Source: www.darkreading.com – Author: Dark Reading Staff Transcript of Dark Reading Confidential, Episode 1: The CISO and the SEC Becky Bracken, Senior Editor, Dark Reading: Hello everyone and welcome to Dark Reading Confidential. It’s a brand new podcast from the editors of Dark Reading where we are going to focus on bringing you real-world stories […]

La entrada Dark Reading Confidential: The CISO and the SEC – Source: www.darkreading.com se publicΓ³ primero en CISO2CISO.COM & CYBER SECURITY GROUP.

Ascension Healthcare Suffers Major Cyberattack – Source: www.darkreading.com

ascension-healthcare-suffers-major-cyberattack-–-source:-wwwdarkreading.com

Source: www.darkreading.com – Author: Nathan Eddy, Contributing Writer Source: MBI via Alamy Stock Photo Healthcare provider Ascension, which operates 140 hospitals across 19 states, fell victim to a cyberattack that took down multiple essential systems including electronic health records (EHRs), the MyChart platform for patient communication, and certain medication and test-ordering systems. The organization disclosed […]

La entrada Ascension Healthcare Suffers Major Cyberattack – Source: www.darkreading.com se publicΓ³ primero en CISO2CISO.COM & CYBER SECURITY GROUP.

Reality Defender Wins RSAC Innovation Sandbox Competition – Source: www.darkreading.com

reality-defender-wins-rsac-innovation-sandbox-competition-–-source:-wwwdarkreading.com

Source: www.darkreading.com – Author: Karen Spiegelman, Features Editor Reality Defender co-founder and CEO Ben Colman (left) onstage with host Hugh ThompsonSource: RSA Conference For the second year in a row, an AI-based security startup took the prize for Most Innovative Startup at RSA Conference’s Innovation Sandbox competition. Last year, HiddenLayer started its presentation with a […]

La entrada Reality Defender Wins RSAC Innovation Sandbox Competition – Source: www.darkreading.com se publicΓ³ primero en CISO2CISO.COM & CYBER SECURITY GROUP.

Is CISA’s Secure by Design Pledge Toothless? – Source: www.darkreading.com

is-cisa’s-secure-by-design-pledge-toothless?-–-source:-wwwdarkreading.com

Source: www.darkreading.com – Author: Nate Nelson, Contributing Writer At 2024’s RSA Conference this week, brand names like Microsoft, Amazon Web Service (AWS), International Business Machines (IBM), Fortinet, and more agreed to take steps toward meeting a set of seven objectives defined by the US’s premier cyber authority. The agreement is voluntary, not legally binding, anodyne, […]

La entrada Is CISA’s Secure by Design Pledge Toothless? – Source: www.darkreading.com se publicΓ³ primero en CISO2CISO.COM & CYBER SECURITY GROUP.

CISO as a CTO: When and Why It Makes Sense – Source: www.darkreading.com

ciso-as-a-cto:-when-and-why-it-makes-sense-–-source:-wwwdarkreading.com

Source: www.darkreading.com – Author: Ericka Chickowski, Contributing Writer Source: designer491 via Alamy Stock Photo As the CISO role matures in enterprise settings and security executives level up their positions from technology managers into more well-rounded risk advisers and business leaders, career progressions are changing. The CISO job is no longer the final executive destination for […]

La entrada CISO as a CTO: When and Why It Makes Sense – Source: www.darkreading.com se publicΓ³ primero en CISO2CISO.COM & CYBER SECURITY GROUP.

RSAC: Experts Highlight Novel Cyber Threats and Tactics – Source: www.infosecurity-magazine.com

rsac:-experts-highlight-novel-cyber-threats-and-tactics-–-source:-wwwinfosecurity-magazine.com

Source: www.infosecurity-magazine.com – Author: 1 As cybercriminals and threat actors increase their tooling and capabilities, new sophisticated attack techniques are emerging and it is vital that defenders stay abreast of this evolution. Daniel Blackford, senior manager, threat research at Proofpoint, explained: β€œA lot of money is following into the hands of bad actors, they’re being […]

La entrada RSAC: Experts Highlight Novel Cyber Threats and Tactics – Source: www.infosecurity-magazine.com se publicΓ³ primero en CISO2CISO.COM & CYBER SECURITY GROUP.

UK’s AI Safety Institute Unveils Platform to Accelerate Safe AI Development – Source: www.infosecurity-magazine.com

uk’s-ai-safety-institute-unveils-platform-to-accelerate-safe-ai-development-–-source:-wwwinfosecurity-magazine.com

Source: www.infosecurity-magazine.com – Author: 1 The UK’s AI Safety Institute has made its AI testing and evaluation platform available to the global AI community as of 10 May, 2024. The platform, called Inspect, is set to pave the way for the safe innovation of AI models, according to the AI Safety Institute and Department for […]

La entrada UK’s AI Safety Institute Unveils Platform to Accelerate Safe AI Development – Source: www.infosecurity-magazine.com se publicΓ³ primero en CISO2CISO.COM & CYBER SECURITY GROUP.

Dell discloses data breach impacting millions of customers – Source: securityaffairs.com

dell-discloses-data-breach-impacting-millions-of-customers-–-source:-securityaffairs.com

Source: securityaffairs.com – Author: Pierluigi Paganini Dell discloses data breach impacting millions of customers Dell disclosed a security breach that exposed millions of customers’ names and physical mailing addresses. IT giant Dell suffered a data breach exposing customers’ names and physical addresses, the company notified impacted individuals. The company launched an investigation into the incident […]

La entrada Dell discloses data breach impacting millions of customers – Source: securityaffairs.com se publicΓ³ primero en CISO2CISO.COM & CYBER SECURITY GROUP.

Citrix warns customers to update PuTTY version installed on their XenCenter system manually – Source: securityaffairs.com

citrix-warns-customers-to-update-putty-version-installed-on-their-xencenter-system-manually-–-source:-securityaffairs.com

Source: securityaffairs.com – Author: Pierluigi Paganini Citrix warns customers to update PuTTY version installed on their XenCenter system manually Citrix urges customers to manually address a PuTTY SSH client flaw that could allow attackers to steal a XenCenter admin’s private SSH key. Versions of XenCenter for Citrix Hypervisor 8.2 CU1 LTSR used PuTTY, a third-party […]

La entrada Citrix warns customers to update PuTTY version installed on their XenCenter system manually – Source: securityaffairs.com se publicΓ³ primero en CISO2CISO.COM & CYBER SECURITY GROUP.

Russia-linked APT28 targets government Polish institutions – Source: securityaffairs.com

russia-linked-apt28-targets-government-polish-institutions-–-source:-securityaffairs.com

Source: securityaffairs.com – Author: Pierluigi Paganini Russia-linked APT28 targets government Polish institutions CERT Polska warns of a large-scale malware campaign against Polish government institutions conducted by Russia-linked APT28. CERT Polska and CSIRT MON teams issued a warning about a large-scale malware campaign targeting Polish government institutions, allegedly orchestrated by the Russia-linked APT28 group. The attribution […]

La entrada Russia-linked APT28 targets government Polish institutions – Source: securityaffairs.com se publicΓ³ primero en CISO2CISO.COM & CYBER SECURITY GROUP.

Google fixes fifth actively exploited Chrome zero-day this year – Source: securityaffairs.com

google-fixes-fifth-actively-exploited-chrome-zero-day-this-year-–-source:-securityaffairs.com

Source: securityaffairs.com – Author: Pierluigi Paganini Google fixes fifth actively exploited Chrome zero-day this year Since the start of the year, Google released an update to fix the fifth actively exploited zero-day vulnerability in the Chrome browser. Google this week released security updates to address a zero-day flaw, tracked as CVE-2024-467, in Chrome browser. The […]

La entrada Google fixes fifth actively exploited Chrome zero-day this year – Source: securityaffairs.com se publicΓ³ primero en CISO2CISO.COM & CYBER SECURITY GROUP.

β€˜Four horsemen of cyber’ look back on 2008 DoD IT breach that led to US Cyber Command – Source: go.theregister.com

β€˜four-horsemen-of-cyber’-look-back-on-2008-dod-it-breach-that-led-to-us-cyber-command-–-source:-gotheregister.com

Source: go.theregister.com – Author: Team Register RSAC A malware-laced USB stick, inserted into a military laptop at a base in Afghanistan in 2008, led to what has been called the worst military breach in US history, and to the creation of the US Cyber Command. The laptop was attached to the Department of Defense’s Central […]

La entrada β€˜Four horsemen of cyber’ look back on 2008 DoD IT breach that led to US Cyber Command – Source: go.theregister.com se publicΓ³ primero en CISO2CISO.COM & CYBER SECURITY GROUP.

GhostStripe attack haunts self-driving cars by making them ignore road signs – Source: go.theregister.com

ghoststripe-attack-haunts-self-driving-cars-by-making-them-ignore-road-signs-–-source:-gotheregister.com

Source: go.theregister.com – Author: Team Register Six boffins mostly hailing from Singapore-based universities say they can prove it’s possible to interfere with autonomous vehicles by exploiting the machines’ reliance on camera-based computer vision and cause them to not recognize road signs. The technique, dubbed GhostStripe [PDF] in a paper to be presented at the ACM […]

La entrada GhostStripe attack haunts self-driving cars by making them ignore road signs – Source: go.theregister.com se publicΓ³ primero en CISO2CISO.COM & CYBER SECURITY GROUP.

Microsoft’s Brad Smith summoned by Homeland Security committee over β€˜cascade’ of infosec failures – Source: go.theregister.com

microsoft’s-brad-smith-summoned-by-homeland-security-committee-over-β€˜cascade’-of-infosec-failures-–-source:-gotheregister.com

Source: go.theregister.com – Author: Team Register The US government wants to make Microsoft’s vice chair and president, Brad Smith, the latest tech figurehead to field questions from a House committee on its recent cybersecurity failings. The House Committee on Homeland Security has proposed the hearing take place later this month on May 22. It will […]

La entrada Microsoft’s Brad Smith summoned by Homeland Security committee over β€˜cascade’ of infosec failures – Source: go.theregister.com se publicΓ³ primero en CISO2CISO.COM & CYBER SECURITY GROUP.

Cybercriminals hit jackpot as 500k+ Ohio Lottery lovers lose out on their personal data – Source: go.theregister.com

cybercriminals-hit-jackpot-as-500k+-ohio-lottery-lovers-lose-out-on-their-personal-data-–-source:-gotheregister.com

Source: go.theregister.com – Author: Team Register More than half a million gamblers with a penchant for powerballs will be receiving some fairly unwelcome news very soon, if not already, as cybercriminals have made off with their personal data. That’s according to Ohio Lottery, which has this week finally revealed the scale of its Christmas Eve […]

La entrada Cybercriminals hit jackpot as 500k+ Ohio Lottery lovers lose out on their personal data – Source: go.theregister.com se publicΓ³ primero en CISO2CISO.COM & CYBER SECURITY GROUP.

Iran most likely to launch destructive cyber-attack against US – ex-Air Force intel analyst – Source: go.theregister.com

iran-most-likely-to-launch-destructive-cyber-attack-against-us-–-ex-air-force-intel-analyst-–-source:-gotheregister.com

Source: go.theregister.com – Author: Team Register Interview China remains the biggest cyber threat to the US government, America’s critical infrastructure, and its private-sector networks, the nation’s intelligence community has assessed. This is probably not all that shocking to anyone paying attention to recent headlines warning of Beijing’s cyber-snoops burrowing into energy facilities, emergency responder networks, […]

La entrada Iran most likely to launch destructive cyber-attack against US – ex-Air Force intel analyst – Source: go.theregister.com se publicΓ³ primero en CISO2CISO.COM & CYBER SECURITY GROUP.

How Can Businesses Defend Themselves Against Common Cyberthreats? – Source: www.techrepublic.com

how-can-businesses-defend-themselves-against-common-cyberthreats?-–-source:-wwwtechrepublic.com

Source: www.techrepublic.com – Author: Fiona Jackson TechRepublic consolidated expert advice on how businesses can defend themselves against the most common cyberthreats, including zero-days, ransomware and deepfakes. Today, all businesses are at risk of cyberattack, and that risk is constantly growing. Digital transformations are resulting in more sensitive and valuable data being moved onto online systems […]

La entrada How Can Businesses Defend Themselves Against Common Cyberthreats? – Source: www.techrepublic.com se publicΓ³ primero en CISO2CISO.COM & CYBER SECURITY GROUP.

Red Sea Crisis and the Risk of Cyber Fallout – Source: www.cyberdefensemagazine.com

red-sea-crisis-and-the-risk-of-cyber-fallout-–-source:-wwwcyberdefensemagazine.com

Source: www.cyberdefensemagazine.com – Author: Stevin By Stan Vitek, Resident Geopolitical Analyst, Cyfirma Introduction As Israel’s military campaign in Gaza continues, the United States as a political sponsor of Israel is contending with regional provocations by several members of the Iranian-aligned β€œaxis of resistance.” These are inevitably gonna involve US forces, Israel and their allies. A […]

La entrada Red Sea Crisis and the Risk of Cyber Fallout – Source: www.cyberdefensemagazine.com se publicΓ³ primero en CISO2CISO.COM & CYBER SECURITY GROUP.

MoD contractor hacked by China failed to report breach for months – Source: www.theguardian.com

mod-contractor-hacked-by-china-failed-to-report-breach-for-months-–-source:-wwwtheguardian.com

Source: www.theguardian.com – Author: Anna Isaac and Dan Sabbagh The IT company targeted in a Chinese hack that accessed the data of hundreds of thousands of Ministry of Defence staff failed to report the breach for months, the Guardian can reveal. The UK defence secretary, Grant Shapps, told MPs on Tuesday that Shared Services Connected […]

La entrada MoD contractor hacked by China failed to report breach for months – Source: www.theguardian.com se publicΓ³ primero en CISO2CISO.COM & CYBER SECURITY GROUP.

Ascension Diverts Emergency Patients, Postpones Care – Source: www.databreachtoday.com

ascension-diverts-emergency-patients,-postpones-care-–-source:-wwwdatabreachtoday.com

Source: www.databreachtoday.com – Author: 1 Cybercrime , Fraud Management & Cybercrime , Healthcare Wednesday Cyber Incident Shakes America’s Largest Healthcare System Marianne Kolbasuk McGee (HealthInfoSec) β€’ May 10, 2024 Β  Β  Image: Ascension The Ascension healthcare system is sending away emergency patients and postponing nonemergency procedures as it digs out from a cyber incident that […]

La entrada Ascension Diverts Emergency Patients, Postpones Care – Source: www.databreachtoday.com se publicΓ³ primero en CISO2CISO.COM & CYBER SECURITY GROUP.

Solving the Fractured Data Problem in Exposure Management – Source: www.databreachtoday.com

solving-the-fractured-data-problem-in-exposure-management-–-source:-wwwdatabreachtoday.com

Source: www.databreachtoday.com – Author: 1 Events , Governance & Risk Management , RSA Conference Sevco Security’s J.J. Guy on Aggregating and Prioritizing Vulnerabilities Mathew J. Schwartz (euroinfosec) β€’ May 10, 2024 Β  Β  J.J. Guy, CEO, Sevco Security Security teams continue to grapple with maintaining a comprehensive and accurate inventory of their digital assets, vulnerabilities […]

La entrada Solving the Fractured Data Problem in Exposure Management – Source: www.databreachtoday.com se publicΓ³ primero en CISO2CISO.COM & CYBER SECURITY GROUP.

Live Webinar | Correcting your Cyber Security Posture with the Board: Data, Metrics and Lessons from 2023 – Source: www.databreachtoday.com

live-webinar-|-correcting-your-cyber-security-posture-with-the-board:-data,-metrics-and-lessons-from-2023-–-source:-wwwdatabreachtoday.com

Source: www.databreachtoday.com – Author: 1 Tim Grieveson Senior Vice President – Global Cyber Security Risk Advisor, Bitsight Tim Grieveson is Senior Vice President – Global Cyber Security Risk Advisor at Bitsight, helping organizations transform how they measure and manage their cybersecurity performance and risk based on years of experience as a CSO, CISO, CIO, and […]

La entrada Live Webinar | Correcting your Cyber Security Posture with the Board: Data, Metrics and Lessons from 2023 – Source: www.databreachtoday.com se publicΓ³ primero en CISO2CISO.COM & CYBER SECURITY GROUP.

Hackers Steal Credit Card Data of Deal-Seeking Shoppers – Source: www.databreachtoday.com

hackers-steal-credit-card-data-of-deal-seeking-shoppers-–-source:-wwwdatabreachtoday.com

Source: www.databreachtoday.com – Author: 1 Card Not Present Fraud , Fraud Management & Cybercrime China-Linked Criminals Processed Orders Worth $50M: Security Research Labs Rashmi Ramesh (rashmiramesh_) β€’ May 10, 2024 Β  Β  These aren’t real Adidas shoes. Neither are the shoes sold by a network of fraudulent online stories dubbed BogusBazaar. (Image: Shutterstock) Hackers linked […]

La entrada Hackers Steal Credit Card Data of Deal-Seeking Shoppers – Source: www.databreachtoday.com se publicΓ³ primero en CISO2CISO.COM & CYBER SECURITY GROUP.

ISMG Editors: RSA Conference 2024 Wrap-Up – Source: www.databreachtoday.com

ismg-editors:-rsa-conference-2024-wrap-up-–-source:-wwwdatabreachtoday.com

Source: www.databreachtoday.com – Author: 1 Events , RSA Conference , RSA Conference Videos Panels Unpack the Buzz Around AI, Future Trends for CISOs Anna Delaney (annamadeline) β€’ May 10, 2024 Β  Β  Mathew Schwartz, Tom Field, Anna Delaney, Rahul Neel Mani and Michael Novinson From the RSA Conference in San Francisco, five ISMG editors unpack […]

La entrada ISMG Editors: RSA Conference 2024 Wrap-Up – Source: www.databreachtoday.com se publicΓ³ primero en CISO2CISO.COM & CYBER SECURITY GROUP.

Daniel Stori’s β€˜tar.gz’ – Source: securityboulevard.com

daniel-stori’s-β€˜targz’-–-source:-securityboulevard.com

Source: securityboulevard.com – Author: Marc Handelman via the inimitable Daniel Stori at Turnoff.US! Permalink *** This is a Security Bloggers Network syndicated blog from Infosecurity.US authored by Marc Handelman. Read the original post at: https://turnoff.us/geek/tar.gz/ Original Post URL: https://securityboulevard.com/2024/05/daniel-storis-tar-gz/ Category & Tags: Humor,Security Bloggers Network,Daniel Stori,Sarcasm,satire,turnoff.us – Humor,Security Bloggers Network,Daniel Stori,Sarcasm,satire,turnoff.us

La entrada Daniel Stori’s β€˜tar.gz’ – Source: securityboulevard.com se publicΓ³ primero en CISO2CISO.COM & CYBER SECURITY GROUP.

Cybersecurity Salary: How Much Can You Earn? – Source: securityboulevard.com

cybersecurity-salary:-how-much-can-you-earn?-–-source:-securityboulevard.com

Source: securityboulevard.com – Author: Kevin Smith Maybe you’ve heard there’s an interplanetary-sized gap in the amount of cybersecurity professionals available and the roles needed to be filled.Β  According to the recent Cybersecurity Workforce Study by the non-profit ISC2, the cybersecurity workforce shortage has hit a record high of nearly 4 million. The disparity between the […]

La entrada Cybersecurity Salary: How Much Can You Earn? – Source: securityboulevard.com se publicΓ³ primero en CISO2CISO.COM & CYBER SECURITY GROUP.

Dell Data Breach Could Affect 49 Million Customers – Source: securityboulevard.com

dell-data-breach-could-affect-49-million-customers-–-source:-securityboulevard.com

Source: securityboulevard.com – Author: Jeffrey Burt Dell is sending emails to as many as 49 million people about a data breach that exposed their names, physical addresses, and product order information. According to the brief message, bad actors breached a Dell portal that contains a database β€œwith limited types of customer information related to purchases […]

La entrada Dell Data Breach Could Affect 49 Million Customers – Source: securityboulevard.com se publicΓ³ primero en CISO2CISO.COM & CYBER SECURITY GROUP.

❌
❌