Identity management in clouds is critical to enterprise security

The continued growth of cloud-based operations and remote working has made managing identities, particularly those of privileged users, increasingly important but also increasingly complex, pushing security firms to look for…

Looted RIPE credentials for sale on the Dark Web

Hundreds of network operator credentials stolen via compromised RIPE accounts were recently discovered on the Dark Web. RIPE, the database of IP addresses and their owners for all countries in…

Removing the ransomware from Johnson Controls costs a whopping $27 million and counting

Johnson Controls International (JCI) spent $27 million remediating a September 2023 ransomware attack against its systems — an attack that government officials warned at the time could threaten physical security.…

“Leaky Ships” Cloud Bugs Allow Containers to Escape Globally

Researchers have discovered a set of four vulnerabilities in container engine components that they have dubbed “Leaky Vessels,” three of which offer attackers a way to escape containers and perform…

Fulton County experiences power outages as cyberattacks continue

As Fulton County in Georgia continues to suffer cyber attacks and power outages, government systems are offline and it is unknown when they will return to operation. Court filings, tax…

Sanctions by the US Treasury for 3 members of ISIS

The U.S. Treasury Department’s Office of Foreign Assets Control (OFAC) placed three individuals associated with the Islamic State of Iraq and Syria (ISIS) on its sanctions list on January 30.…

CMMC is the starting line, not the finish line

COMMENT In recent years, it has become painfully clear that defense industrial base (DIB) companies and those providing critical infrastructure are being actively targeted by threat actors nationwide. Various federal…

Malicious PyPI packages insinuate WhiteSnake InfoStealer malware onto Windows computers

January 29, 2024PressroomPyPI Repository/Malware Cybersecurity researchers have identified malicious packages in the open source Python Package Index (PyPI) repository that deliver an information-stealing malware called The White Snake Thief on…

The imperative of robust security design in healthcare

COMMENT In an era dominated by digital innovation and technological advancesHealthcare companies find themselves at the intersection of immense opportunities and equally unprecedented risks. The digitization of medical records, electronic…

The NSA admits to secretly purchasing your Internet browsing data without collateral

January 29, 2024PressroomSurveillance/Data Privacy The US National Security Agency (NSA) has admitted buying internet browsing records from data brokers to identify websites and apps used by Americans that would otherwise…