The continued growth of cloud-based operations and remote working has made managing identities, particularly those of privileged users, increasingly important but also increasingly complex, pushing security firms to look for…
Category: Cyber Security
Looted RIPE credentials for sale on the Dark Web
Hundreds of network operator credentials stolen via compromised RIPE accounts were recently discovered on the Dark Web. RIPE, the database of IP addresses and their owners for all countries in…
Removing the ransomware from Johnson Controls costs a whopping $27 million and counting
Johnson Controls International (JCI) spent $27 million remediating a September 2023 ransomware attack against its systems — an attack that government officials warned at the time could threaten physical security.…
“Leaky Ships” Cloud Bugs Allow Containers to Escape Globally
Researchers have discovered a set of four vulnerabilities in container engine components that they have dubbed “Leaky Vessels,” three of which offer attackers a way to escape containers and perform…
Fulton County experiences power outages as cyberattacks continue
As Fulton County in Georgia continues to suffer cyber attacks and power outages, government systems are offline and it is unknown when they will return to operation. Court filings, tax…
Sanctions by the US Treasury for 3 members of ISIS
The U.S. Treasury Department’s Office of Foreign Assets Control (OFAC) placed three individuals associated with the Islamic State of Iraq and Syria (ISIS) on its sanctions list on January 30.…
CMMC is the starting line, not the finish line
COMMENT In recent years, it has become painfully clear that defense industrial base (DIB) companies and those providing critical infrastructure are being actively targeted by threat actors nationwide. Various federal…
Malicious PyPI packages insinuate WhiteSnake InfoStealer malware onto Windows computers
January 29, 2024PressroomPyPI Repository/Malware Cybersecurity researchers have identified malicious packages in the open source Python Package Index (PyPI) repository that deliver an information-stealing malware called The White Snake Thief on…
The imperative of robust security design in healthcare
COMMENT In an era dominated by digital innovation and technological advancesHealthcare companies find themselves at the intersection of immense opportunities and equally unprecedented risks. The digitization of medical records, electronic…
The NSA admits to secretly purchasing your Internet browsing data without collateral
January 29, 2024PressroomSurveillance/Data Privacy The US National Security Agency (NSA) has admitted buying internet browsing records from data brokers to identify websites and apps used by Americans that would otherwise…