Black Hat 2021: Wanted posters for ransomware slingers
Is the net closing in on cyber-extortionists and can bounties on their collective heads ultimately help stem the ransomware scourge?…
Security Camera Hacking: It Can Happen to You. Here’s How to Stop It
(An ADT technician has admitted to repeatedly hacking the home security cameras of 200 ‘attractive’ customers to spy on naked…
European Commission Initiates Process to Allow Personal Data Flow to U.K.
The European Commission has initiated a process for transfers of personal data from other EU countries to the U.K. under…
The EU Data Privacy Regulation Vexing Mark Zuckerberg Is a Huge Opportunity for Your Startup
Signing out of account, Standby… There will be immense competitive advantage to being in compliance with the world’s toughest data…
WhatsApp to bring in encryption for backup chats after privacy fears
Users can set encryption key for chats on Google Drive or iCloud to prevent authorities demanding access from providerLast modified…
Will Zero Trust Make EDR Irrelevant?
(Hear from John Kindervag, Senior VP Cybersecurity Strategy and Group Fellow of ON2IT and the creator of Zero Trust, as…
The Challenge of Regulatory Compliance for Critical Infrastructure
The Home of the Security Bloggers NetworkHome » Security Boulevard (Original) » The Challenge of Regulatory Compliance for Critical InfrastructureHealthcare…
DomainTools Releases New Integration with Maltego for Streamlined Incident Response.
DomainTools, a leader in domain name and DNS-based cyber threat intelligence, today announced a new integration with Maltego delivered via…
Russia launches some devastating ransomware attacks
Lindy Cameron, the head of the National Cyber Security Centre (NCSC) has openly announced that Russia launches devastating ransomware attacks…
Hackers Attack Aviation Industry With AsyncRAT to Steal Login Credentials
Cisco Talos has detected and published a series of malicious campaigns recently along with many other security researchers that are…
Most Inspiring Women in Cyber 2021: Bronwyn Boyle, CISO at Mambu
The IT Security Guru’s Most Inspiring Women in Cyber Awards aims to shed a light on the remarkable women in…
Critical vulnerability in Slack allows fingerprinting attacks on users
Cybersecurity specialists report the detection of a security flaw in the file sharing feature in Slack whose exploitation would allow…
The antidote to brand impersonation attacks is awareness
In this interview with Help Net Security, Dirk Jan Koekkoek, VP, DMARC at Mimecast, talks about the growing threat of…
Pentagon revamps CMMC program to help SMBs meet compliance standards
The streamlined CMMC 2.0 program is designed to cut red tape for small- to medium-sized businesses by making it easier…
‘Tortilla’ Wraps Exchange Servers in ProxyShell Attacks
NewsletterJoin thousands of people who receive the latest breaking cybersecurity news every day.The administrator of your personal data will be…
Popular routers found vulnerable to hacker attacks
Millions of Brits could be at risk of cyberattacks due to poor default passwords and a lack of firmware updates…
Nexus 5, Galaxy S5 and iPhone 5s hacked at Pwn2Own event
The Samsung Galaxy S5, Apple iPhone 5s and Google Nexus 5 were amongst handsets to be successfully hacked during the…
Supply‑chain attacks: When trust goes wrong, try hope?
How can organizations tackle the growing menace of attacks that shake trust in software?Cybersecurity is only as good as the…
California outlaws poor default passwords in connected devices
The law is intended to help curb attacks that rely on weak, non-existent or publicly disclosed passwords that far too…
New York City's incoming mayor wants his first three paychecks paid in Bitcoin
What just happened? Eric Adams, New York City’s mayor-elect, wants to make the city the “center of the cryptocurrency industry.”…