NIST Publishes New Zero Trust Implementation Guidance Information Security Magazine 7 months 3 weeks ago The new NIST guidance sets out 19 example implementations of zero trust using commercial, off-the-shelf technologies
Europol Says Criminal Demand for Data is “Skyrocketing” Information Security Magazine 7 months 3 weeks ago Europol warns of “vicious circle” of data breaches and cybercrime
Phishing Alert as Erie Insurance Reveals Cyber “Event” Information Security Magazine 7 months 3 weeks ago Erie Insurance reveals suspected network breach and ongoing outage
Congress Introduces Bill to Strengthen Healthcare Cybersecurity Information Security Magazine 7 months 3 weeks ago The legislation aims to expand the federal government’s role in helping healthcare providers protect and respond to cyber-attacks
20,000 Asian IPs and Domains Dismantled in Infostealer Crackdown Information Security Magazine 7 months 3 weeks ago Interpol-coordinated Operation Secure led to 32 arrests, including the suspected ringleader of a cybercriminal organization
Hands-On Skills Now Key to Landing Your First Cyber Role Information Security Magazine 7 months 3 weeks ago An ISC2 study found that 90% of security hiring managers would consider entry-level candidates with only previous IT work experience
Researcher Finds Five Zero-Days and 20+ Misconfigurations in Salesforce Cloud Information Security Magazine 7 months 3 weeks ago The products affected by the issues are part of the Salesforce OmniStudio suite, including FlexCards and Data Mappers
Half of Mobile Users Now Face Daily Scams Information Security Magazine 7 months 3 weeks ago Malwarebytes claims 44% of mobile users are exposed to scams every day
Two Microsoft Zero-Days for Admins to Fix in June Patch Tuesday Information Security Magazine 7 months 3 weeks ago Microsoft has patched two zero days this month, one of which is being exploited in the wild
Android Enterprise Rolls Out Security and Productivity Updates Information Security Magazine 7 months 3 weeks ago Android Enterprise has introduced features for mobile security, device management and user productivity in its latest update
Mastery Schools Notifies 37,031 of Major Data Breach Information Security Magazine 7 months 3 weeks ago A ransomware attack on Mastery Schools, Philadelphia, has compromised personal information of 37,031 individuals, exposing sensitive data
DDoS Attacks on Financial Sector Surge in Scale and Sophistication Information Security Magazine 7 months 3 weeks ago The financial sector was the industry most targeted by distributed denial-of-service (DDoS) attacks in 2024, with a peak in October
SentinelOne Warns Cybersecurity Vendors of Chinese Attacks Information Security Magazine 7 months 3 weeks ago SentinelOne revealed details of two new intrusion attempts by China-nexus actors
Wholesale Food Giant UNFI Admits Security Breach Information Security Magazine 7 months 3 weeks ago UNFI says it is investigating unauthorized network activity, and that some operations are affected
PayU Plugin Flaw Allows Account Takeover on 5000 WordPress Sites Information Security Magazine 7 months 3 weeks ago Vulnerability in PayU CommercePro plugin allows account hijacking on thousands of WordPress sites
New Wiper Malware Targets Ukrainian Infrastructure Information Security Magazine 7 months 3 weeks ago New PathWiper malware targeted Ukrainian critical infrastructure, using legitimate tools for cyber-attacks
Trump Administration Revises Cybersecurity Rules, Replaces Biden and Obama Orders Information Security Magazine 7 months 3 weeks ago A new Trump Executive Order limits the use of cybersecurity-related sanctions only against foreign malicious actors
US Tries to Claw Back $7m Taken by North Korean IT Workers Information Security Magazine 7 months 3 weeks ago The Justice Department has filed a civil forfeiture complaint alleging North Korean IT workers amassed $7m+
FBI Warns Smart Home Users of Badbox 2.0 Botnet Threat Information Security Magazine 7 months 3 weeks ago The FBI says mainly Chinese-made IoT devices pose a threat from Badbox 2.0 malware
Scattered Spider Uses Tech Vendor Impersonation and Phishing Kits to Target Helpdesks Information Security Magazine 7 months 4 weeks ago The ransomware group combines IT vendor impersonation and phishing frameworks like Evilginx to breach its targets