Recent Security News
-
Nigerian Arrested, Charged in $7.5 Million BEC Scheme Targeting US Charities
January 5, 2024 at 06:30AM Nigerian national Olusegun Samson Adejorin is accused of perpetrating a $7.5 million business email compromise (BEC) scheme on two charitable organizations in the US. Adejorin allegedly obtained employee credentials, made fraudulent fund withdrawal requests, and used various tools to perpetrate the fraud. He faces multiple charges and is awaiting court…
-
Energy Department Offering $70 Million for Security, Resilience Research
January 5, 2024 at 06:30AM The US Department of Energy is offering $70 million in funding through the All-Hazards Energy Resilience program for research in cybersecurity, physical threats, natural disasters, and extreme weather events. The DOE aims to enhance the resilience and security of the energy sector and will fund up to 25 projects, with…
-
Russia Hacked Residential Cameras in Ukraine to Spy on Air Defense, Critical Infrastructure
January 5, 2024 at 06:30AM Ukraine’s Security Service took down two hacked residential surveillance cameras used by Russian threat actors to spy on Kyiv’s air defense and infrastructure. The hacked webcams were leveraged by Russia to aid its missile attack on Kyiv. This incident underscores the importance of maintaining cybersecurity for IoT devices, as they…
-
Vigilant Ops Raises $2 Million for SBOM Management Platform
January 5, 2024 at 05:30AM Vigilant Ops, a cybersecurity startup based in Pittsburgh, Pennsylvania, recently secured a $2 million seed investment from DataTribe. The investment aims to aid organizations in managing software bills of materials through Vigilant Ops’ automated platform. The platform caters to regulated organizations, offering vulnerability monitoring and security patch notifications to ensure…
-
Exposed Secrets are Everywhere. Here’s How to Tackle Them
January 5, 2024 at 05:27AM The text emphasizes the importance of effectively managing exposed secrets within an organization’s source code to prevent unauthorized access and data breaches. It outlines the key factors in addressing exposed secrets, such as classification, understanding the scope of exposure, identifying root causes, and leveraging technology for effective secrets management. It…