Recent Security News

  • Data De-Identification: Balancing Privacy, Efficacy & Cybersecurity

    November 28, 2023 at 04:50AM Data privacy laws aim to protect consumer data by implementing best practices for businesses. However, recent data breaches suggest that these regulations have not been successful in safeguarding consumer data. One reason is the need for companies to balance privacy protection, product efficacy, and cybersecurity. Data de-identification is a key…

    Read More

  • Hamas-Linked APT Wields New SysJoker Backdoor Against Israel

    November 28, 2023 at 04:36AM Amid the ongoing conflict between Israel and Hamas, attackers associated with Hamas are using an updated version of the SysJoker backdoor to target Israeli entities. This new variant, written in the Rust programming language, retains similar functionalities but has undergone significant evolution. The attackers are also utilizing OneDrive instead of…

    Read More

  • Consumer Software Security Assessment: Should We Follow NHTSA’s Lead?

    November 28, 2023 at 04:14AM The text discusses the need for a consumer software security organization similar to the US National Highway Traffic Safety Administration. It highlights the lack of safety standards for software and the need to protect consumers from digital crimes. The text suggests the creation of safety ratings for software and devices…

    Read More

  • Police dismantle ransomware group behind attacks in 71 countries

    November 28, 2023 at 04:06AM Law enforcement agencies from seven nations, in cooperation with Europol and Eurojust, have arrested key members of a ransomware group in Ukraine. The group paralyzed major corporations using ransomware like LockerGoga, MegaCortex, HIVE, and Dharma. The investigation revealed that the group encrypted over 250 servers, resulting in losses exceeding several…

    Read More

  • A bird’s eye view of your global attack surface

    November 28, 2023 at 04:01AM Outpost24’s External Attack Surface Management (EASM) solution offers continuous mapping, analysis, and monitoring of an organization’s attack surface. It identifies vulnerabilities and provides recommendations on how to address them. The cloud-based solution requires no software installation and integrates with various applications to coordinate issue resolution. Outpost24 also provides a free…

    Read More