Skip to main content

Lapsus$ Claims Hack of IT Giant Globant After Arrests of Alleged Members

Chrome Browser Gets Major Security Update | 'Brokenwire' Hack Prevents Charging of Electric Vehicles
  Your SecurityWeek Briefing Webcasts
RSS Feed
03.30.22


Wednesday, March 30, 2022



What Are the Threats Associated With Secrets Sprawl?

Why is it hard to detect secrets and where in the SDLC to implement automated secrets detection?

Read Now, It's Ungated !



The Need for Resilient Zero Trust
Cyber resilience is the only way to guarantee true Zero Trust. When implemented properly, resilient Zero Trust becomes a preventive measure that counteracts human error, malicious actions, and decayed, insecure software.
Read the Full Column
by Torsten George


Six Ways to Expand Your Fraud Program
While attackers and fraudsters are continually adapting and evolving, there are some measures that businesses can take to improve their fraud programs
Read the Full Column
by Joshua Goldfarb





The Elusive Goal of Network Security
No matter how far you stray from having a perfect system — or how close you come to attaining one — the pursuit is always an essential and worthwhile investment of your time.
Read the Full Column
by Marie Hattar



Achieving Positive Outcomes With Multi-Domain Cyber and Open Source Intelligence
Many think open source intelligence is just another name for better googling. They are wrong. Good open source and threat intelligence are derived from three core capabilities.
Read the Full Column
by Landon Winkelvoss



A Sheep in Wolf's Clothing: Technology Alone is a Security Facade
Vendor agnostic technology, married with actionable, globally-sourced, and continually evolving intelligence, augmented by humans, is needed to defend our enterprises.
Read the Full Column
by Keith Ibarguen





What are the threats associated with secrets sprawl?

Why is it hard to detect secrets and where in the SDLC to implement automated secrets detection?

Read Now, it's ungated !




See All Recent Articles at SecurityWeek.Com

GitGuardian Whitepaper (Ungated)

Lapsus$ Claims Hack of IT Giant Globant After Arrests of Alleged Members: The Lapsus$ hacker group claims to have hacked IT giant Globant just days after several alleged members of the group were arrested in the UK. Read More

Chrome Browser Gets Major Security Update: Google ships a security-themed Chrome browser makeover with patches 28 documented vulnerabilities, some serious enough to lead to code execution attacks. Read More

US Government Warns of Attacks Targeting UPS Devices: CISA says that removing internet access to the management interface of UPS devices prevents attacks. Read More

Remote 'Brokenwire' Hack Prevents Charging of Electric Vehicles: Researchers have identified a new attack method, dubbed Brokenwire, that can be used to remotely interrupt the charging of electric vehicles. Read More

Cyera Emerges From Stealth Mode With $60M to Protect Cloud Data: Cloud data security startup Cyera emerged from stealth mode with $60 million in funding to help companies find and protect data stored in various cloud environments. Read More

Investors Bet on Cyberpion in Attack Surface Management Space: Attack surface management specialists Cyberpion has secured $27 million in early-stage funding to build technology that helps organizations manage exposure to risk. Read More

Researchers Find Python-Based Ransomware Targeting Jupyter Notebook Web Apps: Researchers have found what they believe to be the first Python-based ransomware sample specifically targeting Jupyter Notebooks. Read More

Shutterfly Employee Data Compromised in Ransomware Attack: Shutterfly is notifying employees that their data might have been compromised in a Conti ransomware attack in December 2021. Read More

Risks of Using Russian Tech Analyzed by UK Cybersecurity Agency: UK's NCSC cybersecurity agency has shared recommendations on the use of Russian technology products and services for both individual users and organizations. Read More

Federal Agencies Instructed to Patch New Chrome Zero-Day: CISA added the vulnerability to its Must Patch list alongside 31 other security bugs. Read More

Finland's Spy Service Warns of Russian Interference, Attacks: Finland must brace for Russian interference and hybrid attacks as it weighs whether to join the NATO military alliance, the security services warned on Tuesday. Read More

Hackers Steal Over $600M in Major Crypto Heist: Hackers stole cryptocurrency worth over $600 million from a digital ledger used by players of the popular online game Axie Infinity, in a major digital cash heist revealed. Read More

Researchers Hack Remote Keyless System of Honda Vehicles: A researcher has published proof-of-concept (PoC) videos to demonstrate how an attacker can remotely unlock the doors of a Honda vehicle, or even start its engine. Read More

Checkmarx Finds Threat Actor 'Fully Automating' NPM Supply Chain Attacks: Threat hunters at Checkmarx raise an alarm after discovering a threat actor fully automating the creation and delivery of "hundreds of malicious packages" into the NPM ecosystem. Read More

GitGuardian Whitepaper (Ungated)





To help make sure the SecurityWeek Briefing reaches you, please add news@securityweek.com to your address book.

© 2022 Wired Business Media



Comments

Popular posts from this blog

{White Paper} Legacy Codebase Risk - Addressing Open Source Tech Debt In Your Software Supply Chain

Tech Debt Best Practices: Minimizing opportunity cost & security risk - Get the White Paper You received this resource as part of your SecurityWeek subscription or because you have attended a Webcast or downloaded a White paper from SecurityWeek in the past. This email is strictly controlled and distributed by SecurityWeek and your email address has not been shared with any third party. Tech Debt Best Practices: Minimizing Opportunity Cost & Security Risk - Get the White Paper SecurityWeek Subscriber, Legacy codebases are one of today's biggest software supply chain risks. Nearly 80% of codebases are never updated, and 91% of organizations have faced supply chain attacks exploiting open source vulnerabilities. We're hoping you weren't one of them! The flexibility of developing with open source provides unmatched innovation, but with that has come the implicit cost of accumulating tech...

Chinese Hackers Have Been Probing DNS Networks Globally for Years: Report

Island Raises $175M as Enterprise Browser Startups Defy Tech Giants Tuesday, April 30 , 2024 LATEST CYBERSECURITY HEADLINES Island Secures $175M Investment as Enterprise Browser Startups Defy Tech Giants Why Using Microsoft Copilot Could Amplify Existing Data Quality and Privacy Issues Chinese Hackers Have Been Probing DNS Networks Globally for Years: Report Finnish Hacker Gets Prison for Accessing Thousands of Psychotherapy Records and Demanding Ransoms FCC Fines Wireless Carriers for Sharing User Locations Without Consent SafeBase Scores $33M Series B Investment Vulnerability in R Programming Language Could Fuel Supply Chain Attacks Docker Hub Users Targeted With Imageless, Malicious Repositories Critical Vulnerabilities in Judge0 Lead to Sandbox Escape, Host Takeover CISA Rolls Out New Guidelines to Mitigate AI Risks to US Critical Infrastructure Apptega Raises $15 Million for Cybersecurity ...

US National Cyber Strategy Pushes Aggressive Hack-Back Operations

Wiz Raises $300 Million at $10B Valuation| News Corp Discloses New Details of Data Breach SecurityWeek News Briefing | Monday, February 27, 2023 US National Cyber Strategy Pushes Aggressive Hack-Back Operations Cloud Security Firm Wiz Raises $300 Million at $10 Billion Valuation Cyberattack on Boston Union Results in $6.4M Loss US Sanctions Several Entities Aiding Russia’s Cyber Operations ‘PureCrypter’ Downloader Used to Deliver Malware to Governments QNAP Offering $20,000 Rewards via New Bug Bounty Program News Corp Discloses New Details of Data Breach Palo Alto Networks Unveils Zero Trust OT Security Solution A Year of Conflict: Cybersecurity Industry Assesses Impact of Russia-Ukraine War - On the first anniversary of Russia’s invasion of Ukraine, cybersecurity companies summarize the cyber operations they have seen and their. (...