Gold Optis: Most Innovative and Socially Conscious Technologies at Black Hat

Gold Optis: Most Innovative and Socially Conscious Technologies at Black Hat

By Olivia Gallucci, Cybersecurity Reporter, Cyber Defense Magazine I interviewed approximately sixty industry leaders from over forty companies who attended Black Hat. Although this article series—The Optis—can be read as a traditional Black Hat recap, I specifically highlight twenty-one companies that stand out and whose growth I recommend watching. Rochester Institute of Technology’s Cybersecurity Club, RITSEC, inspired the metrics I used to analyze and rank companies. Specifically, I adopted RITSEC’s motto, “Security Through Community,” while…

Read More

Here’s all you need to know to become a white-hat hacker

Here’s all you need to know to become a white-hat hacker

Switch to an exciting new career in the tech industry by studying on your own without taking time from your job or going into debt. Image: goodbishop/Shutterstock Have you ever wanted to be a hacker, but work for the good guys? Few fields are more interesting or more in demand than almost anything related to cybersecurity, and the extremely affordable 2021 All-in-One Ethical Hacking & Penetration Testing Bundle has nine courses designed to teach beginners…

Read More

Australia Passes Identify and Disrupt Bill

Australia Passes Identify and Disrupt Bill

A coalition bill that grants the police more powers to spy on criminal suspects online has been passed by the Australian government. The Surveillance Legislation Amendment (Identify and Disrupt) bill has created three new types of warrants that enable the Australian Federal Police (AFP) and Australian Criminal Intelligence Commission (ACIC) to modify and delete data belonging to cybercriminal suspects and take over their accounts.  Using the new data disruption warrants, the AFP and the ACIC can prevent serious offenses…

Read More

Glitch Exposed Data of Alleged Treaty Violator to FBI

Glitch Exposed Data of Alleged Treaty Violator to FBI

Private data belonging to an alleged treaty violator was accessible to unauthorized FBI agents for months because of a software program flaw. The glitch in the Palantir program was reportedly exploited by at least four Bureau employees to view data belonging to Singapore resident and US citizen Virgil Griffith.  Former Ethereum developer Griffith was arrested at Los Angeles International Airport in November 2019 and charged with violating the International Emergency Economic Powers Act by traveling to the Democratic People’s Republic…

Read More

Revere Health Data Breach Impacts Cardiology Patients

Revere Health Data Breach Impacts Cardiology Patients

The Personal Identifiable Information (PII) of approximately 12,000 cardiology patients has been exposed in a cyber-attack on a healthcare provider based in Utah. Patient data in the care of Revere Health was compromised when the organization fell victim to a phishing attack on June 21, 2021. An attacker impersonating the US Agency for International Development (USAID) sent an email to a Revere Health employee that contained a malicious link. When the employee clicked the link, they inadvertently…

Read More

Cloud Blog – VMWare – Google Cloud VMware Engine

Cloud Blog – VMWare – Google Cloud VMware Engine

VMware is pleased to announce support for VMware NSX Advanced Load Balancer Enterprise Edition (formerly by Avi Networks) with Google Cloud VMware® Engine. NSX Advanced Load Balancer (NSX ALB/Avi) allows customers to deploy enterprise grade application delivery services with local load balancing, global server load balancing (GSLB) and Web Application Firewall (WAF) for workloads running in Google Cloud VMware Engine. As customers extend or migrate their data centers from on-premises to Google Cloud VMware Engine,…

Read More

U.S. State Department was recently hit by a cyber attack

U.S. State Department was recently hit by a cyber attack

The U.S. State Department was recently hit by a cyber attack, the Department of Defense Cyber Command might have suffered a serious breach. The U.S. State Department was recently hit by a cyber attack, the Department of Defense Cyber Command is notifying impacted individuals, White House Correspondent and fill-in anchor at Fox News Jacqui Heinrich revealed. It is unclear when the security breach was discovered, but analysts believe it took place a couple of weeks…

Read More

Kanye’s upcoming album is a scam magnet, Kaspersky finds

Kanye’s upcoming album is a scam magnet, Kaspersky finds

“Donda” will be out Aug. 26, and scammers are taking advantage of fan anticipation by seeding the internet with malicious fake downloads. Image: iStock/Melpomenem With Kanye West’s latest album, “Donda,” due out imminently, cybersecurity company Kaspersky has taken the time to investigate whether cybercriminals were taking advantage of the hype to spread malicious files, a la “Black Widow.” It found that, while the number of scams wasn’t huge, they do exist and take several different…

Read More

FBI flash alert warns on OnePercent Group Ransomware attacks

FBI flash alert warns on OnePercent Group Ransomware attacks

The FBI shared info about OnePercent Group that has been actively targeting US organizations in ransomware attacks since at least November 2020. The Federal Bureau of Investigation (FBI) has published a flash alert about a threat actor known as OnePercent Group that has been actively targeting US organizations in ransomware attacks since at least November 2020. The alert includes tactics, techniques, and procedures (TTP), along with indicators of compromise related to group. The flash alert also…

Read More

Looking Back at Executive Order on Cybersecurity and What it Means for Your Business

Looking Back at Executive Order on Cybersecurity and What it Means for Your Business

By James Gorman, CISO of AuthX On May 12, 2021, President Biden issued an Executive Order focused on improving the nation’s cybersecurity. This executive order strives to accomplish several important objectives for the United States’ approach to safeguarding its data and systems. Create a Zero Trust environment Manage the supply chain and its vulnerabilities Minimize barriers to intelligence sharing Create a Safety Review Board Create a standardized playbook for Incident Response The key outcomes for US cybersecurity procedures from this executive order include: Developing a Zero Trust environment. This insight can apply to any organization, regardless of industry or size. Incorporating just this one element will lead…

Read More
1 2,131 2,132 2,133 2,134 2,135 2,596