January 20, 2023

Cyberattacks on the High Seas: What Is Maritime Cybersecurity?

In the maritime industry, common issues that emerge while vessels are en route include piracy, accidents, and poor weather conditions. However, another serious problem – increasing cyberattacks – is a growing concern in the sector responsible for transporting large volumes of goods. What will it take for the maritime industry to bolster its cybersecurity posture …

Cyberattacks on the High Seas: What Is Maritime Cybersecurity? Read More »

Fingerprint partners with Ping Identity to help customers prevent fraud

Fingerprint and Ping Identity partnership enables PingOne DaVinci customers to identify devices throughout user journeys, which helps prevent fraud and improve the overall customer experience. Fingerprint joins a growing network of technology partners developing integrations with PingOne DaVinci through the Ping Identity Global Technology Partner Program. Partner solutions that integrate with PingOne DaVinci deliver an …

Fingerprint partners with Ping Identity to help customers prevent fraud Read More »

CISA Cybersecurity Program Goals (CPG) at Code42

A little over one year ago, on July 28, 2021, President Biden signed a memorandum entitled “National Security Memorandum on Improving Cybersecurity for Critical Infrastructure Control Systems“. Like a lot of similar activities around that time, it was in response to a series of sometimes-devastating cyber attacks against critical infrastructure, of which the Colonial Pipeline …

CISA Cybersecurity Program Goals (CPG) at Code42 Read More »

Yara rules pageant

A few days ago I posted a very specific question on Twitter and Mastodon: You’ve got gazillion of random yara rules stored inside many random .yar files scattered around many folders. What do you use to read them all, remove duplicates, ensure all rule names are unique, and all the unique rules end up in …

Yara rules pageant Read More »

Bitwarden acquires Passwordless.dev to boost passwordless solutions

Bitwarden’s acquisition of Passwordless.dev comes on the heels of a $100M funding round and allows Bitwarden to equip customers with a strong WebAuthn framework from which to develop custom features and deliver passwordless user experiences. A core part of the FIDO2 specification, WebAuthn is a modern open authentication standard supported by browsers and technology giants …

Bitwarden acquires Passwordless.dev to boost passwordless solutions Read More »

T-Mobile suffered a new data breach, 37 million accounts have been compromised

Bad news for T-Mobile, the company disclosed a new data breach that resulted in the theft of data belonging to 37 customer accounts. T-Mobile suffered a new data breach, threat actor stole the personal information of 37 million current postpaid and prepaid customer accounts. The telecommunications company discovered the intrusion on January 5, 2023, the attackers obtained …

T-Mobile suffered a new data breach, 37 million accounts have been compromised Read More »

Top cloud strategy mistakes that organizations are making

EXECUTIVE SUMMARY: Nearly every organization relies on cloud computing, but many organizations still lack a cloud strategy or even a cloud implementation plan. Organizations that maintain a cloud strategy (and corresponding documentation) are more likely to benefit from cloud transformations than organizations that lack a clear vision for cloud. In short, a cloud strategy serves …

Top cloud strategy mistakes that organizations are making Read More »

Fortinet VPN Flaw Shows Pitfalls of Security Appliances

Internet-Facing Appliances Are a Target for State-Backed Hackers Mihir Bagwe (MihirBagwe) • January 20, 2023     Image: Shutterstock A threat actor, possibly affiliated with the Chinese government, exploited a now-patched zero-day vulnerability in the Fortinet virtual private network, says Mandiant. See Also: Next-Generation Firewall Buyer’s Guide The exploit is likely part of China’s pattern …

Fortinet VPN Flaw Shows Pitfalls of Security Appliances Read More »

Optiv CEO Kevin Lynch on Getting Value Via Unstructured Data

Artificial Intelligence & Machine Learning , Next-Generation Technologies & Secure Development , Video Why Clients Should Go Beyond Logs and Probe Transaction Data and System Interfaces Michael Novinson (MichaelNovinson) • January 20, 2023     Kevin Lynch, CEO, Optiv (Image: Optiv) Optiv has gone beyond examining log data and classic managed security services work to …

Optiv CEO Kevin Lynch on Getting Value Via Unstructured Data Read More »

ISMG Editors: Why Is LockBit Ransomware Group So Prolific?

Fraud Management & Cybercrime , Ransomware , Video Also: Netskope’s SASE Vision; The Compassionate CISO Anna Delaney (annamadeline) • January 20, 2023     Clockwise, from top left: Anna Delaney, Mathew Schwartz, Michael Novinson and Tom Field In the latest weekly update, four editors at Information Security Media Group discuss important cybersecurity and privacy issues, …

ISMG Editors: Why Is LockBit Ransomware Group So Prolific? Read More »

U.S. AI, IoT, CAV, and Privacy Legislative Update – Fourth Quarter 2022

This quarterly update summarizes key legislative and regulatory developments in the fourth quarter of 2022 related to Artificial Intelligence (“AI”), the Internet of Things (“IoT”), connected and autonomous vehicles (“CAVs”), and data privacy and cybersecurity. Artificial Intelligence In the last quarter of 2022, the annual National Defense Authorization Act (“NDAA”), which contained AI-related provisions, was …

U.S. AI, IoT, CAV, and Privacy Legislative Update – Fourth Quarter 2022 Read More »

Experts question T-Mobile’s security culture as breach cycle churns

T-Mobile’s reputation on cybersecurity matters is being put to the test, on repeat and at a scale and cadence with few obvious comparisons in telecom or enterprise at large. The company committed to improving its security posture and increasing investments in data privacy and related technologies after a massive data breach in August 2021, but …

Experts question T-Mobile’s security culture as breach cycle churns Read More »

How the famous Argentinean Scammer ” El Hacker or C14″ was tracked and arrested by Police

Share this… He resided at Saint Thomas Country Club. He then moved to El Rebenque, a gated enclave near Canning, where he paid $2,000 a month. He drove an Audi and Mini Cooper before buying a Mercedes-Benz E350 AMG. Alejandro Jakimczuk, C14 or El Hacker, was apprehended in a Cañuelas house three days after moving …

How the famous Argentinean Scammer ” El Hacker or C14″ was tracked and arrested by Police Read More »

Wallarm touts API leak protection with new scanning feature

API security company Wallarm announced Frdiay that it had opened a preview period for its newest offering — an active scanning system that checks through public sources of compromised API data, alerts users, and provides automated responses if a compromise is detected. The API Leak Protection feature, which will be deployed via Wallarm’s existing End-to-End …

Wallarm touts API leak protection with new scanning feature Read More »

Cybercriminals Exploiting HR Policy Announcements in Phishing Attacks

As the new year begins, companies and their employees should be aware of a new type of phishing attack that is targeting the human resources department. Cybercriminals are posing as HR officials and sending phishing emails that contain themes related to updated HR policy announcements. These emails typically include links or attachments that are used …

Cybercriminals Exploiting HR Policy Announcements in Phishing Attacks Read More »

T-Mobile Breached Again, This Time Exposing 37M Customers’ Data

T-Mobile has disclosed a new, enormous breach that occurred in November, which was the result of the compromise of a single application programming interface (API). The result? The exposure of the personal data of more than 37 million prepaid and postpaid customer accounts. For those keeping track, this latest disclosure marks the second sprawling T-Mobile data breach in …

T-Mobile Breached Again, This Time Exposing 37M Customers’ Data Read More »

T-Mobile Breached Again, This Time Exposing 37M Customers’ Data

T-Mobile has disclosed a new, enormous breach that occurred in November, which was the result of the compromise of a single application programming interface (API). The result? The exposure of the personal data of more than 37 million prepaid and postpaid customer accounts. For those keeping track, this latest disclosure marks the second sprawling T-Mobile data breach in …

T-Mobile Breached Again, This Time Exposing 37M Customers’ Data Read More »

Ransomware Profits Decline as Victims Dig In, Refuse to Pay

In another sign that the tide may be finally turning against ransomware actors, ransom payments declined substantially in 2022 as more victims refused to pay their attackers — for a variety of reasons. If the trend continues, analysts expect ransomware actors will start demanding bigger ransoms from larger victims to try and compensate for falling …

Ransomware Profits Decline as Victims Dig In, Refuse to Pay Read More »

Exploit code for ManageEngine RCE flaw published. Patch immediately

Share this… Because to the use of an obsolete third-party dependecies  many ManageEngine products might make it possible for a remote attacker to execute arbitrary code on the system. This was caused by the usage of an outdated third-party component. If SAML single sign-on is presently enabled on certain products or was enabled on them in …

Exploit code for ManageEngine RCE flaw published. Patch immediately Read More »