December 6, 2022

Police Dismantle SIM Swapping Gang in Spain

The Spanish National Police successfully arrested a SIM swapping gang known as the “Black Panthers”, making 55 arrests in Barcelona.  Their operation included committing bank scams through SIM swapping attacks and other methods such as social engineering techniques, and voice phishing (aka vishing, phishing, and call forwarding. The group managed to accumulate a total amount of …

Police Dismantle SIM Swapping Gang in Spain Read More »

AppOmni joins forces with Veeva to provide data protection for life sciences

AppOmni has partnered with Veeva Systems to expand SaaS coverage and provide enhanced security for Veeva Vault and Veeva CRM. The new offering enables life sciences customers to access AppOmni’s configuration management and threat detection functionality. With AppOmni’s Veeva integration, joint customers can operationalize best practices to protect sensitive data while ensuring compliance with regulatory …

AppOmni joins forces with Veeva to provide data protection for life sciences Read More »

Aviatrix partners with Equinix to deliver encrypted connection to the cloud

Aviatrix has joined forces with Equinix to deliver Aviatrix Edge software across 25+ of Equinix’s global International Business Exchange data centers. The combined solution, which leverages Equinix’s Network Edge and Equinix Fabric, delivers the highest performance encrypted connection to the cloud and provides the multicloud visibility and control enterprises require. “We are all in on …

Aviatrix partners with Equinix to deliver encrypted connection to the cloud Read More »

How Chinese APT41 stole $20 million from Covid-19 stimulus fund?

Share this… According to information obtained from sources within the Secret Service, computer hackers with links to the Chinese government stole at least $20 million in the United States by unlawfully accessing financial assistance funding intended for the COVID-19 outbreak. According to NBC, police sources and cybersecurity specialists, it is a gang of hackers known …

How Chinese APT41 stole $20 million from Covid-19 stimulus fund? Read More »

Average Fortune 500 Company Has 476 Critical Vulnerabilities

In a recent analysis of the public and Internet-facing assets of 471 of the Fortune 500 companies, Cyberpion uncovered more than 148,000 critical vulnerabilities (exploits that are publicly available and actively targeted), with an average of 476 per company. Fully 98 percent of Fortune 500 companies have critically vulnerable internal assets, 95 percent have expired …

Average Fortune 500 Company Has 476 Critical Vulnerabilities Read More »

Shift to Memory-Safe Languages Gains Momentum

The software industry is making headway against a group of pernicious vulnerabilities that are responsible for the vast majority of critical, remotely exploitable, and in-the-wild attacks, software-security experts said this week. The class of vulnerabilities — so-called memory-safety issues — include buffer overflows and use-after-free errors and have accounted for the majority of application security …

Shift to Memory-Safe Languages Gains Momentum Read More »

8 security vulnerabilities in Sophos Firewall version < 19.5.0

Share this… Customers have been alerted by Sophos that many vulnerabilities, including ones that may lead to arbitrary code execution, have been patched in Sophos Firewall version 19.5. Some of these security flaws were uncovered in-house by Sophos, while others were brought to the attention of the business by third-party researchers who participated in the …

8 security vulnerabilities in Sophos Firewall version < 19.5.0 Read More »

Rezonate emerges from stealth and raises $8.7 million

Rezonate emerged from stealth with $8.7 million in financing for its disruptive cloud identity protection platform that prevents access risk and stops attackers’ actions to breach cloud infrastructure, where modern organizations’ critical data resides. Backing this new approach are State of Mind Ventures and Flybridge, with participation from toDay Ventures, Merlin Ventures seed fund, renowned …

Rezonate emerges from stealth and raises $8.7 million Read More »

[tl;dr sec] #161 – ChatGPT, Scaling Vulnerability Management in Microservices, Supply Chain

Hey there, I hope you’ve been doing well! 🧙‍♂️ Announcing: Staff Security Engineer How do you get to Staff level in security? It can be hard to know, as there’s not much guidance out there. Where is the staffeng.com for security? I’m thrilled to announce that my bud Rami McCarthy went out and got stories …

[tl;dr sec] #161 – ChatGPT, Scaling Vulnerability Management in Microservices, Supply Chain Read More »

How Universal Profiling unwinds stacks without frame pointers and symbols

… the sequence of return addresses all the way to the start of the program (highlighted in yellow). This is what is commonly known as “unwinding or walking the stack,” and it is what the eBPF helper functions in the Linux Kernel provide for you. Most profilers that use eBPF use these helper functions. We …

How Universal Profiling unwinds stacks without frame pointers and symbols Read More »

Network Usage Fees Will Harm European Consumers and Businesses

Network usage fees, the idea that certain types of companies should pay internet service providers (ISPs) for the ability to deliver their content to consumers, both hurts consumers and breaks the status quo that has facilitated the rapid spread of the global internet. ISPs claim these fees are necessary because the cost for delivering internet …

Network Usage Fees Will Harm European Consumers and Businesses Read More »

Rackspace hacked by Ransomware gang via Microsoft exchange vulnerability

Share this… Rackspace, a provider of cloud computing services, has admitted that it was the victim of a ransomware incident, which resulted in the business being forced to shut down its Hosted Exchange environment. Since Friday, December 2, the hosted Microsoft Exchange service provided by Rackspace has been experiencing a variety of issues. The affected …

Rackspace hacked by Ransomware gang via Microsoft exchange vulnerability Read More »

Sourced Group an Amdocs Company, empowers the growth of BaaS for Standard Chartered nexus

Banking as a Service (BaaS) is revolutionising the finance sector. BaaS enables non-financial companies to provide customers with financial products and services such as personal loans, credit cards and digital savings accounts. It leverages the expertise and experience of trusted banks, such as Standard Chartered, so they can offer a wider range of services to …

Sourced Group an Amdocs Company, empowers the growth of BaaS for Standard Chartered nexus Read More »

Previewing Black Hat Europe 2022 in London: 12 Hot Sessions

Black Hat , Endpoint Security , Events Collective DDoS Defense, Rethinking Internet Defense, Zero-Day Harvesting and More Mathew J. Schwartz (euroinfosec) • December 6, 2022     Winter in London features throngs of holiday shoppers along Oxford Street, ice-skating at Hyde Park Winter Wonderland and the return of Black Hat Europe. The venerable cybersecurity event …

Previewing Black Hat Europe 2022 in London: 12 Hot Sessions Read More »

Rackspace Confirms Exchange Outage Caused by Ransomware

Fraud Management & Cybercrime , Incident & Breach Response , Ransomware Companies Tells US SEC That the Incident Will Affect Revenue Akshaya Asokan (asokan_akshaya) • December 6, 2022     Image: Shutterstock Hosted services company Rackspace says ransomware is the cause of ongoing outages to its hosted Exchange environment. See Also: Live Webinar | How …

Rackspace Confirms Exchange Outage Caused by Ransomware Read More »

The Supreme Court Must Protect Internet Users’ Rights to Access Controversial Information Online

Lawsuits claiming that online services aid terrorist organizations just by hosting their content or having users who espouse the organizations’ views potentially could censor a vast amount of protected expression online, EFF and a coalition of other civil society groups argued in a brief filed this week. In Twitter v. Taamneh, the U.S. Court of …

The Supreme Court Must Protect Internet Users’ Rights to Access Controversial Information Online Read More »

Aqua CEO on Why Cloud-Native Apps Need Supply Chain Security

Application Security , Next-Generation Technologies & Secure Development , Video Aqua’s Dror Davidoff Shares How Open-Source Repositories Create Risk for Cloud Apps Michael Novinson (MichaelNovinson) • December 6, 2022     Dror Davidoff, co-founder and CEO, Aqua Security (Photo: Aqua Security) Software has increasingly relied on components developed by third parties or from open-source libraries, …

Aqua CEO on Why Cloud-Native Apps Need Supply Chain Security Read More »

Commvault appoints Shane Sanders to Board of Directors

Commvault has appointed Verizon veteran Shane Sanders to its Board of Directors. Sanders will also serve on the Audit Committee. For more than 30 years, Sanders has driven transformative business initiatives and counseled executives and directors on matters including shareholder value creation, target setting, capital allocation, and enterprise risk management and compliance. Most recently as …

Commvault appoints Shane Sanders to Board of Directors Read More »

Establishing Trust and Control in the Age of Data Privacy Regulation

One of the most important components of data privacy and security is being compliant with the regulations that call for the protection of information. Regulators want to see transparency and controllability within organizations, because that is what makes them trustworthy from a data privacy and security standpoint. Ideally, organizations will deploy systems that provide compelling evidence …

Establishing Trust and Control in the Age of Data Privacy Regulation Read More »

Apple’s AirTag Is Stalkers’ ‘Weapon Of Choice,’ Victims Say

By Lauren Berg (December 6, 2022, 11:05 PM EST) — Apple’s AirTag has become the “weapon of choice” of stalkers to track their victims, but that hasn’t stopped the tech company from touting the product as “stalker proof” and ignoring the concerns of people at risk of abuse, according to a proposed class action filed …

Apple’s AirTag Is Stalkers’ ‘Weapon Of Choice,’ Victims Say Read More »

Managing an Increasingly Risk-Averse Regulatory Environment

Risk management and mitigation is a high priority for CEOs and other senior executives worldwide — including CIOs and cybersecurity executives. The fact is, it’s impossible to separate risk from technology implementations and the potential cybersecurity vulnerabilities they present. One of the biggest challenges of risk management, as it relates to IT, is the emergence of a …

Managing an Increasingly Risk-Averse Regulatory Environment Read More »

Managing M&A Risk: How Endpoint Visibility Could Deliver Critical Advantage

Merger and acquisition (M&A) activity hit a record high in 2021 of more than $5 trillion in global volume. While the market has certainly slowed this year, it remains on par with pre-pandemic levels — quite a feat at a time of business uncertainty and inflation. But when it comes to corporate deal-making, risk lurks around every corner. The …

Managing M&A Risk: How Endpoint Visibility Could Deliver Critical Advantage Read More »

Managing M&A Risk: How Endpoint Visibility Could Deliver Critical Advantage

Merger and acquisition (M&A) activity hit a record high in 2021 of more than $5 trillion in global volume. While the market has certainly slowed this year, it remains on par with pre-pandemic levels — quite a feat at a time of business uncertainty and inflation. But when it comes to corporate deal-making, risk lurks around every corner. The …

Managing M&A Risk: How Endpoint Visibility Could Deliver Critical Advantage Read More »

Combining Cybersecurity and Reliability Risk Management for Better Collaboration across IT

Cybersecurity threats and their resulting breaches are top of mind for CIOs today. Managing such risks, however, is just one aspect of the entire IT risk management landscape that CIOs must address. Equally important is reliability risk – the risks inherent in IT’s essential fragility. Issues might occur at anytime, anywhere across the complex hybrid …

Combining Cybersecurity and Reliability Risk Management for Better Collaboration across IT Read More »

Rackspace confirms ransomware attack behind days-long email outage

Updated Rackspace has admitted a ransomware infection was to blame for the days-long email outage that disrupted services for customers.  The security snafu took down some of Rackspace’s hosted Microsoft Exchange services on Friday afternoon. In its most recent update, posted at 0826 Eastern Time on Tuesday, Rackspace said it has now “determined this suspicious activity …

Rackspace confirms ransomware attack behind days-long email outage Read More »

How Can Boards and CIOs Help Reduce Risk? By Asking the Right Questions

Cybersecurity breaches can result in millions of dollars in losses for global enterprises and they can even represent an existential threat for smaller companies. For boards of directors not to get seriously involved in protecting the information assets of their organizations is not just risky — it’s negligent. Boards need to be on top of …

How Can Boards and CIOs Help Reduce Risk? By Asking the Right Questions Read More »