June 2023

Uptycs integrates with Amazon Security Lake to provide telemetry across workloads

Uptycs integrates with Amazon Security Lake to provide telemetry across workloads 01/06/2023 at 17:32 By Industry News Uptycs has integrated with Amazon Security Lake from Amazon Web Services (AWS). Amazon Security Lake automatically centralizes security data from across AWS environments, SaaS providers, on-premises, and cloud sources into a purpose-built data lake. Amazon Security Lake manages […]

React to this headline:

Loading spinner

Uptycs integrates with Amazon Security Lake to provide telemetry across workloads Read More »

7,500 fraudulent pharmaceutical listings were taken down in 2022

7,500 fraudulent pharmaceutical listings were taken down in 2022 01/06/2023 at 17:32 By Pharmaceutical fraud targeting patients and organizations was targeted in a recent report by BrandShield and the Pharmaceutical Security Institute.  This article is an excerpt from Subscribe to Security Magazine’s RSS Feed View Original Source React to this headline:

React to this headline:

Loading spinner

7,500 fraudulent pharmaceutical listings were taken down in 2022 Read More »

Code42 names Wayne Jackson to its Board of Directors

Code42 names Wayne Jackson to its Board of Directors 01/06/2023 at 17:07 By Industry News Code42 Software has announced the appointment of Wayne Jackson to its board of directors. Jackson boasts an impressive career in enterprise security software and currently serves as the CEO of Sonatype. “We are pleased to welcome Wayne Jackson to Code42’s

React to this headline:

Loading spinner

Code42 names Wayne Jackson to its Board of Directors Read More »

Safe Security unveils Cyber Risk Cloud of Clouds platform

Safe Security unveils Cyber Risk Cloud of Clouds platform 01/06/2023 at 16:42 By Industry News Safe Security announced Cyber Risk Cloud of Clouds for predicting and preventing cyber breaches. In contrast to the rest of the industry that takes a reactive approach, SAFE’s Cyber Risk Cloud of Clouds enables organizations to make informed and predictive

React to this headline:

Loading spinner

Safe Security unveils Cyber Risk Cloud of Clouds platform Read More »

Cisco Acquiring Armorblox for Predictive and Generative AI Technology

Cisco Acquiring Armorblox for Predictive and Generative AI Technology 01/06/2023 at 16:18 By Eduard Kovacs Cisco is in the process of acquiring email security firm Armorblox for its predictive and generative artificial intelligence (AI) technology. The post Cisco Acquiring Armorblox for Predictive and Generative AI Technology appeared first on SecurityWeek. This article is an excerpt

React to this headline:

Loading spinner

Cisco Acquiring Armorblox for Predictive and Generative AI Technology Read More »

Stellar Cyber integrates with Amazon Security Lake to boost data processing and threat detection

Stellar Cyber integrates with Amazon Security Lake to boost data processing and threat detection 01/06/2023 at 16:14 By Industry News Stellar Cyber announced support for the Amazon Security Lake from Amazon Web Services (AWS). Organizations using the Stellar Cyber Open XDR Platform and AWS can directly ingest data from the Amazon Security Lake into Stellar

React to this headline:

Loading spinner

Stellar Cyber integrates with Amazon Security Lake to boost data processing and threat detection Read More »

How organizations can protect against phishing campaigns

How organizations can protect against phishing campaigns 01/06/2023 at 16:14 By With cybersecurity threats on the rise, there are two crucial steps an organization can take to avoid falling victim to a credential phishing attack. This article is an excerpt from Subscribe to Security Magazine’s RSS Feed View Original Source React to this headline:

React to this headline:

Loading spinner

How organizations can protect against phishing campaigns Read More »

Threat actors can exfiltrate data from Google Drive without leaving a trace

Threat actors can exfiltrate data from Google Drive without leaving a trace 01/06/2023 at 15:43 By Zeljka Zorz Google Workspace (formerly G Suite) has a weak spot that can prevent the discovery of data exfiltration from Google Drive by a malicious outsider or insider, Mitiga researchers say. A problem for digital forensic analysts and incident

React to this headline:

Loading spinner

Threat actors can exfiltrate data from Google Drive without leaving a trace Read More »

Malicious PyPI Packages Using Compiled Python Code to Bypass Detection

Malicious PyPI Packages Using Compiled Python Code to Bypass Detection 01/06/2023 at 15:43 By Researchers have discovered a novel attack on the Python Package Index (PyPI) repository that employs compiled Python code to sidestep detection by application security tools. “It may be the first supply chain attack to take advantage of the fact that Python

React to this headline:

Loading spinner

Malicious PyPI Packages Using Compiled Python Code to Bypass Detection Read More »

How Wazuh Improves IT Hygiene for Cyber Security Resilience

How Wazuh Improves IT Hygiene for Cyber Security Resilience 01/06/2023 at 15:43 By IT hygiene is a security best practice that ensures that digital assets in an organization’s environment are secure and running properly. Good IT hygiene includes vulnerability management, security configuration assessments, maintaining asset and system inventories, and comprehensive visibility into the activities occurring in

React to this headline:

Loading spinner

How Wazuh Improves IT Hygiene for Cyber Security Resilience Read More »

Moxa Patches MXsecurity Vulnerabilities That Could Be Exploited in OT Attacks

Moxa Patches MXsecurity Vulnerabilities That Could Be Exploited in OT Attacks 01/06/2023 at 15:19 By Eduard Kovacs Critical authentication bypass and high-severity command injection vulnerabilities have been patched in Moxa’s MXsecurity product. The post Moxa Patches MXsecurity Vulnerabilities That Could Be Exploited in OT Attacks appeared first on SecurityWeek. This article is an excerpt from

React to this headline:

Loading spinner

Moxa Patches MXsecurity Vulnerabilities That Could Be Exploited in OT Attacks Read More »

Syxsense partners with VLCM to provide customers with endpoint security and management solutions

Syxsense partners with VLCM to provide customers with endpoint security and management solutions 01/06/2023 at 15:05 By Industry News Syxsense announced a partnership with VLCM, an IT solutions and services provider focused on meeting customer needs for cybersecurity, networking, cloud, big data, and more. VLCM is one of Syxsense’s platinum channel partners and offers Syxsense

React to this headline:

Loading spinner

Syxsense partners with VLCM to provide customers with endpoint security and management solutions Read More »

Resecurity appoints Shawn Loveland as COO

Resecurity appoints Shawn Loveland as COO 01/06/2023 at 14:14 By Industry News Resecurity announced the appointment of Shawn Loveland as its Chief Operating Officer (COO). With an impressive track record of over 35 years in technology and cybersecurity, Mr. Loveland brings extensive experience and expertise to the Resecurity team. His illustrious career at Microsoft, where

React to this headline:

Loading spinner

Resecurity appoints Shawn Loveland as COO Read More »

Amazon Settles Ring Customer Spying Complaint

Amazon Settles Ring Customer Spying Complaint 01/06/2023 at 13:47 By AFP The FTC charged Amazon-owned Ring with failing to implement basic protections to stop hackers or employees from accessing people’s devices or accounts. The post Amazon Settles Ring Customer Spying Complaint appeared first on SecurityWeek. This article is an excerpt from SecurityWeek RSS Feed View

React to this headline:

Loading spinner

Amazon Settles Ring Customer Spying Complaint Read More »

Organizations Warned of Salesforce ‘Ghost Sites’ Exposing Sensitive Information

Organizations Warned of Salesforce ‘Ghost Sites’ Exposing Sensitive Information 01/06/2023 at 13:47 By Eduard Kovacs Salesforce ghost sites — domains that are no longer maintained but still accessible — can expose personal information and business data. The post Organizations Warned of Salesforce ‘Ghost Sites’ Exposing Sensitive Information appeared first on SecurityWeek. This article is an

React to this headline:

Loading spinner

Organizations Warned of Salesforce ‘Ghost Sites’ Exposing Sensitive Information Read More »

Adobe Inviting Researchers to Private Bug Bounty Program

Adobe Inviting Researchers to Private Bug Bounty Program 01/06/2023 at 13:47 By Ionut Arghire Adobe is inviting security researchers to join its private bug bounty program on the HackerOne platform. The post Adobe Inviting Researchers to Private Bug Bounty Program appeared first on SecurityWeek. This article is an excerpt from SecurityWeek RSS Feed View Original

React to this headline:

Loading spinner

Adobe Inviting Researchers to Private Bug Bounty Program Read More »

Improved BlackCat Ransomware Strikes with Lightning Speed and Stealthy Tactics

Improved BlackCat Ransomware Strikes with Lightning Speed and Stealthy Tactics 01/06/2023 at 12:49 By The threat actors behind BlackCat ransomware have come up with an improved variant that prioritizes speed and stealth in an attempt to bypass security guardrails and achieve their goals. The new version, dubbed Sphynx and announced in February 2023, packs a “number of

React to this headline:

Loading spinner

Improved BlackCat Ransomware Strikes with Lightning Speed and Stealthy Tactics Read More »

Critical Vulnerabilities Found in Faronics Education Software

Critical Vulnerabilities Found in Faronics Education Software 01/06/2023 at 12:35 By Ionut Arghire Faronics patches critical-severity remote code execution (RCE) vulnerabilities in the Insight education software. The post Critical Vulnerabilities Found in Faronics Education Software appeared first on SecurityWeek. This article is an excerpt from SecurityWeek RSS Feed View Original Source React to this headline:

React to this headline:

Loading spinner

Critical Vulnerabilities Found in Faronics Education Software Read More »

Zyxel firewalls under attack by Mirai-like botnet

Zyxel firewalls under attack by Mirai-like botnet 01/06/2023 at 11:52 By Zeljka Zorz CVE-2023-28771, the critical command injection vulnerability affecting many Zyxel firewalls, is being actively exploited by a Mirai-like botnet, and has been added to CISA’s Known Exploited Vulnerabilities (KEV) catalog. About CVE-2023-28771 CVE-2023-28771 is a vulnerability that allows unauthenticated attackers to execute OS

React to this headline:

Loading spinner

Zyxel firewalls under attack by Mirai-like botnet Read More »

N. Korean ScarCruft Hackers Exploit LNK Files to Spread RokRAT

N. Korean ScarCruft Hackers Exploit LNK Files to Spread RokRAT 01/06/2023 at 11:16 By Cybersecurity researchers have offered a closer look at the RokRAT remote access trojan that’s employed by the North Korean state-sponsored actor known as ScarCruft. “RokRAT is a sophisticated remote access trojan (RAT) that has been observed as a critical component within the

React to this headline:

Loading spinner

N. Korean ScarCruft Hackers Exploit LNK Files to Spread RokRAT Read More »

Scroll to Top