News
-
"NIST Offers Draft Guidance on Evaluating a Privacy Protection Technique for the AI Era"A new publication from the National Institute of Standards and Technology (NIST) offers guidance on using a type of mathematical algorithm known as differential privacy to help data-centric organizations strike a balance between privacy and accur
-
"Cold Storage Giant Americold Discloses Data Breach After April Malware Attack"Cold storage and logistics giant Americold has recently confirmed that over 129,000 employees and their dependents had their personal information stolen in an April attack, later claimed by Cactus ransomware.
-
"Toyota Warns Customers of Data Breach Exposing Personal, Financial Info"Toyota Financial Services (TFS) is warning customers it suffered a data breach, stating that sensitive personal and financial data was exposed in the attack.
-
"NSA and ESF Partners Release Recommended Practices for Managing Open Source Software and Software Bill of Materials"The National Security Agency (NSA), the Office of the Director of National Intelligence (ODNI), the Cybersecurity and Infrastructure Security Agency (CISA), and industry partners have released a Cybersecurity Technical Report (CTR) titled "Securi
-
"Cybercriminals Continue Targeting Open Remote Access Products"According to WatchGuard, cybercriminals continue to prefer open remote access products or legitimate remote access tools for hiding their actions.
-
"Lazarus Group Is Still Juicing Log4Shell, Using RATs Written in 'D'"North Korean hackers continue to exploit Log4Shell, recently using that access to launch one of three new Remote Access Trojans (RATs) written in the "D" (dlang) programming language.
-
"Norton Healthcare Ransomware Hack: 2.5 Million Personal Records Stolen"Kentucky healthcare organization Norton Healthcare started informing 2.5 million individuals that their personal information was compromised in a ransomware data extortion hack earlier this year.
-
"Over 30% Of Log4j Apps Use a Vulnerable Version of the Library"About 38 percent of applications using the Apache Log4j library are still vulnerable to security issues, including Log4Shell, a critical vulnerability with the highest severity rating.
-
"Cybersecurity Protects Food, Agriculture"The Pacific Northwest National Laboratory (PNNL) is working on the first US Department of Homeland Security (DHS)-sponsored effort to explore the cybersecurity vulnerabilities and potential impact of increasingly smart agriculture technologies on US so
-
"Saddling up Cryptosystems for a Quantum Showdown"A team of researchers may have discovered the key to tackling threats from a large-scale quantum attack in an algebraic structure known as a quadratic twist.
-
"QR-Code Phishing Has Multiplied: How Detection Helps Security Teams Win"A new wave of Microsoft-themed email messages emerged in June. The messages appeared legitimate, with the Microsoft logo prominently displayed and a familiar email template requiring the user to update their two-factor authentication (2FA) code.
-
"Pretexting: A Growing Threat That Avoids Phishing's Obvious Tells"Phishing attacks on businesses pose a constant threat of data compromise, which is why many businesses invest in phishing awareness training. Training has resulted in more employees being aware of phishing strategies.