Sophisticated MATA Framework Strikes Eastern European Oil and Gas Companies
An updated version of a sophisticated backdoor framework called MATA has been used in attacks aimed at over a dozen...
EU gives Meta and TikTok formal Hamas disinformation deadline
Both firms must respond within a week to the request for information under the EU’s new tech rules....
Amazon, Expedia and Trustpilot unite to fight fake reviews
Major online firms will work together to fight fake reviews and share best practice. Source:: BBC News –...
Spotlight: The Unfortunate Origin of a NIST Metal Toughness Program Still Going Strong
A series of catastrophic failures in U.S. ships during World War II prompted the start of a program...
Understanding Cybersecurity Career Paths
Cybersecurity Career Week October 16-21, 2023 nist.gov/nice/ccw The pathways to – and through – a career in cybersecurity...
Vulnerability Scanning: How Often Should I Scan?
The time between a vulnerability being discovered and hackers exploiting it is narrower than ever – just 12 days....
Google Play Protect Introduces Real-Time Code-Level Scanning for Android Malware
Google has announced an update to its Play Protect with support for real-time scanning at the code level...
Iran-Linked OilRig Targets Middle East Governments in 8-Month Cyber Campaign
The Iran-linked OilRig threat actor targeted an unnamed Middle East government between February and September 2023 as part of an...
Money-making scripts attack organizations
In April of this year, the FBI published an advisory on attacks targeting government, law enforcement, and non-profit...
Teaching AI to behave is the fastest-growing career skill
How important has prompt engineering become among IT skills? So important that Erick Brethenoux, an adjunct professor at...
Spider-Man 2: PS5 developer on stories, game length, and what’s next
The PS5 game’s creative director Bryan Intihar talks about crafting a follow-up to a beloved hit. Source:: BBC...
Microsoft Warns of North Korean Attacks Exploiting TeamCity Flaw
North Korean threat actors are actively exploiting a critical security flaw in JetBrains TeamCity to opportunistically breach vulnerable...
Nokia to axe up to 14,000 jobs to cut costs
The Finnish telecoms giant reported a disappointing result due to slowing sales of 5G equipment. Source:: BBC News...
Google TAG Detects State-Backed Threat Actors Exploiting WinRAR Flaw
A number of state-back threat actors from Russia and China have been observed exploiting a recent security flaw...
Nvidia and iPhone maker Foxconn to build “AI factories”
This comes as the US announced plans to cut off more exports of advanced chips to China, in...
Is AI about to transform the legal profession?
Law firms are increasingly using artificial intelligence systems, but it comes with risks. Source:: BBC News – Technology
Cisco Catalyst SD-WAN Manager Local File Inclusion Vulnerability
A vulnerability in the web UI of Cisco Catalyst SD-WAN Manager could allow an authenticated, remote attacker to...
Amazon Redshift announces integration with AWS Secrets Manager
Amazon Redshift now supports integration with AWS Secrets Manager to simplify the management of Redshift administration (admin) credentials for...
Amazon Connect now provides additional levels of granular access control
Amazon Connect now supports additional levels of granularity for tag based access controls within the admin website, allowing you to...
Share Amazon Route 53 Application Recovery Controller clusters across multiple AWS accounts
You can now use AWS Resource Access Manager (AWS RAM) to share cluster resources across accounts in Amazon...