Leaked Files From Iran Cyber Units Shows Interest in Targeting ICS: Classified files apparently leaked from an Iranian cyber unit show that the country is looking to improve its offensive cyber capabilities, including against ICS. Read More Turn Off, Turn On: Simple Step Can Thwart Top Phone Hackers: At a time of widespread digital insecurity it turns out that the oldest and simplest computer fix there is — turning a device off then back on again — can thwart hackers from stealing information from smartphones. Read More How Low-level Hackers Access High-end Malware: Hacking tool downloads from underground forums are increasing, and the tools are becoming more sophisticated; low-level hackers are gaining access to hacked versions of sophisticated tools; access broking is growing; and existing tools are repurposed for more aggressive attacks. Read More BlackCloak Raises $11 Million for Its Executive Protection Platform: BlackCloak, a company that provides cyber protection services for corporate executives and high-profile individuals, has raised $11 million in a Series A funding round. Read More Researchers Publish Details on Recent Critical Hyper-V Vulnerability: Guardicore Labs provides full details on CVE-2021-28476, a critical vulnerability in Hyper-V's virtual network switch driver. Read More MSSP SolCyber Emerges From Stealth With $20 Million Series A Funding: SolCyber has emerged from stealth with $20 million in Series A funding from ForgePoint Capital, claiming to be the first modern MSSP for the mid-market. Read More LogicGate Raises $113 Million in Series C Funding: The risk and compliance solutions provider will invest in an upcoming risk quantification solution, as well as in expanding its market presence globally. Read More Google Details New Privacy and Security Policies for Android Apps: Submissions and updates for applications that do not provide insight into their privacy and security practices will be rejected from Google Play starting April 2022. Read More eCommerce Fraud Prevention Firm Riskified Prices IPO at $21 Per Share: eCommerce fraud prevention company Riskified has priced its IPO at $21 per share and is hoping to raise more than $360 million. Read More Serious Vulnerabilities Found in Firmware Used by Many IP Camera Vendors: IP cameras from a dozen vendors are exposed to remote attacks due to serious vulnerabilities found in the firmware they all use. Read More US Acting to Better Protect Infrastructure From Cyberthreats: The Biden administration is eyeing ways to harden cybersecurity defenses for critical infrastructure. It's announcing Wednesday the development of performance goals and a voluntary public-private partnership to protect core sectors. Read More Foxit Plugs Multiple Security Holes in PDF Reader, Editor: Foxit Software patches vulnerabilities that put users at risk of remote code execution attacks via specially crafted PDF files. Read More US Gov Warning: VPN, Network Perimeter Product Flaws Under Constant Attack: A high-powered joint advisory calls attention to gaping holes in perimeter-type devices like VPN appliances, network access gateways and enterprise cloud applications. Read More Cyber Asset Management Platform Noetic Launches With $20 Million in Funding: The company relies on API aggregation and correlation to gather data from multiple security and IT management tools. Read More Hospital Network Reveals Cause of 2020 Cyberattack: A cyberattack that crippled the computer systems of University of Vermont Health Network last fall happened after an employee opened a personal email on a company laptop while on vacation. Read More Survey Shows Reasons for Cloud Misconfigurations are Many and Complex: A survey shows the most prevalent attacks against the cloud correlate with the most common misconfigurations experienced by respondents. Read More University of San Diego Health Says Personal Information Stolen in Data Breach: UC San Diego Health says unauthorized access to employee accounts resulted in names, healthcare data, SSNs, payment details, and other sensitive information getting compromised. Read More |
Comments
Post a Comment