ICO Reprimands UK Organizations for GDPR Failings
Subject Access Requests experiencing significant delays
Cyber NewsSubject Access Requests experiencing significant delays
Cyber NewsWe post our daily lives to social media and think nothing of making key details about our lives public. We need to reconsider what we share online and how attackers can use this information to target businesses. Your firm’s security may be one text message away from a breach. How and why attackers target new […]
Cyber NewsThe Russian state-sponsored threat actor known as APT28 has been found leveraging a new code execution method that makes use of mouse movement in decoy Microsoft PowerPoint documents to deploy malware. The technique “is designed to be triggered when the user starts the presentation mode and moves the mouse,” cybersecurity firm Cluster25 said in a technical report. “The code […]
Cyber NewsMeta Platforms on Tuesday disclosed it took steps to dismantle two covert influence operations originating from China and Russia for engaging in coordinated inauthentic behavior (CIB) so as to manipulate public debate. While the Chinese operation sets its sights on the U.S. and the Czech Republic, the Russian network primarily targeted Germany, France, Italy, Ukraine […]
Cyber NewsRansomware is one of the most dangerous threats organizations face today, so it’s no wonder that Cisco Talos Incident Response named it the top threat of the year in 2021. These attacks continue to grow and become more advanced, with ransomware attacks (see Figure 1 below).1 Stopping ransomware attacks isn’t easy either, as adversaries continue […]
Cyber NewsFound documents in Poland detail US spying operations against the former Soviet Union. The file details a number of bugs found at Soviet diplomatic facilities in Washington, D.C., New York, and San Francisco, as well as in a Russian government-owned vacation compound, apartments used by Russia personnel, and even Russian diplomats’ cars. And the bugs […]
Cyber NewsZecOps extends Jamf’s mobile security capabilities by adding advanced detections and incident response.
Cyber NewsACM.64 Automating the creation of subnets an NACLS in AWS CloudFormation This is a continuation of my series on Automating Cybersecurity Metrics. We implemented our Public and Private VPCs and added VPC Flow Logs in the last few posts. Now we need to create Subnets and Network Access Control Lists (NACLs). What are subnets? They are a […]
Cyber NewsA recently discovered malware builder called Quantum Builder is being used to deliver the Agent Tesla remote access trojan (RAT). “This campaign features enhancements and a shift toward LNK (Windows shortcut) files when compared to similar attacks in the past,” Zscaler ThreatLabz researchers Niraj Shivtarkar and Avinash Kumar said in a Tuesday write-up. Sold on the dark […]
Cyber News