FBI and CISA Publish Advisory on Malicious Cyber Activity Against Election Infrastructure
Threat actors trying to compromise elections are unlikely to result in large-scale disruptions
Cyber NewsThreat actors trying to compromise elections are unlikely to result in large-scale disruptions
Cyber NewsJoe Sullivan schemed to hide a 2016 breach of 57 million users’ information shortly after he was hired. The post Former Uber CSO found guilty of obstruction in attempted data breach cover-up appeared first on TechRepublic.
Cyber NewsYesterday, a federal jury handed down a guilty verdict to Joe Sullivan, the former CSO on charges of “obstruction of the proceedings of the Federal Trade Commission and misprision of felony in connection with the attempted cover-up of a 2016 hack at Uber” according to a notice published by the Department of Justice (DOJ). US […]
Cyber NewsRussian-speaking cyberattackers boast they are behind disruption of Colorado, Kentucky, and Mississippi government websites.
Cyber NewsTargeting more than 21,000 users, the phishing email managed to bypass Microsoft Exchange email security, says Armorblox. The post Phishing attack spoofs Zoom to steal Microsoft user credentials appeared first on TechRepublic.
Cyber NewsThe trend, spotted by Consumer Reports, could mean good news for organizations struggling to contain remote work challenges.
Cyber NewsConsumers who have used a credit card for a legitimate purchase only to have the sale rejected may be encountering a problem that costs enterprises billions of dollars a year: cybersecurity technology that is designed for fraud detection often ends up generating false positives, incorrectly sending out an alert that a transaction is suspicious. To […]
Cyber NewsACM.72 Network architecture for developer access to GitHub and AWS This is a continuation of my series of posts on Automating Cybersecurity Metrics. If you’ve been following along you know that I’ve been setting up components to run batch jobs on AWS, but not only run them — we want to think through how we will securely deploy […]
Cyber NewsFind out the best practices for securely deploying applications and managing data in the cloud. The post Top 5 best practices for cloud security appeared first on TechRepublic.
Cyber News