Technology helps address student safety and behavioral health concerns

Technology helps address student safety and behavioral health concerns

Technology helps address student safety and behavioral health concerns | 2021-06-28 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more….

Read More

Emergency operations center best practices for hurricane season

Emergency operations center best practices for hurricane season

Emergency operations center best practices for hurricane season | 2021-06-28 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. …

Read More

5 minutes with Tony Bai and Joe Cortese – The future of supply chain security

5 minutes with Tony Bai and Joe Cortese – The future of supply chain security

5 minutes with Tony Bai and Joe Cortese – The future of supply chain security | 2021-06-28 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy…

Read More

Why A ‘Layers and Lists’ Approach to Cybersecurity Is Doomed to Fail

Why A ‘Layers and Lists’ Approach to Cybersecurity Is Doomed to Fail

By Gary Fischer, VP Americas, XM Cyber Why is cyber-defense such an asymmetrical war? Hackers can launch a barrage of attacks on a single target and keep going until they find one overlooked weakness. Defenders, meanwhile, are often overwhelmed with alerts, unsure what to patch first and have little real visibility into the weaknesses of their ever-changing environments. In a battle between active adversaries who only need to land a single blow to win — and passive defenders…

Read More

New Report Shows Over Two Million Secrets Detected on Public GitHub in 2020 and a 20% growing trend Year-Over-Year.

New Report Shows Over Two Million Secrets Detected on Public GitHub in 2020 and a 20% growing trend Year-Over-Year.

By Jeremy Thomas, GitGuardian CEO When we started working on GitGuardian’s detection algorithm and got the first detection results, we could not believe it. We were facing a very counterintuitive reality. Secrets were actually hard coded in source code and available for all to see on public GitHub. And not just developers’ personal secrets but also corporate secrets ending up on developers’ personal repositories outside of corporate control. After scanning billions of commits each year…

Read More

Securing Patient Private Information in The Age of Shared Information

Securing Patient Private Information in The Age of Shared Information

By Christian Gitersonke, CEO, Health Insurance Answers The Problem Theft of Private Health Information (PHI) has been around almost as long as healthcare in this country. As technology has evolved and safeguards continue to be put in place to protect it, criminals have found ways to exploit the often times inadequate and sloppy protection of our personal health data. Regardless of the technological safeguards in place, one of the greatest exposures we see are employees…

Read More

Ransomware-as-a-service business model takes a hit in the aftermath of the Colonial Pipeline attack

Ransomware-as-a-service business model takes a hit in the aftermath of the Colonial Pipeline attack

Cybercrime gangs are finding it harder to recruit partners for the affiliate programs that power ransomware attacks. Image: iStockphoto/nicescene The best way to stop the ever-increasing wave of ransomware attacks is to take away the financial incentive behind these cyber crimes. The response to the Colonial Pipeline ransomware attack may be the first step in doing just that. Both governments and hacker forums have made it harder for ransomware gangs to use the ransomware-as-a-service (RaaS)…

Read More

ChaChi, a GoLang Trojan used in ransomware attacks on US schools

ChaChi, a GoLang Trojan used in ransomware attacks on US schools

A new Trojan written in the Go programming language, tracked as ChaChi, was involved in ransomware attacks against government agencies and US schools. Researchers from BlackBerry Threat Research and Intelligence spotted a new RAT written in the Go programming language, dubbed ChaChi, which has been used by PYSA (aka Mespinoza) operators to target victims globally. The name ChaChi comes from two key components of the malware, Chashell and Chisel.  Chashell is a reverse shell over DNS provider, while Chisel is a port-forwarding tool….

Read More

Young Americans Twice as Likely to Cyber-stalk

Young Americans Twice as Likely to Cyber-stalk

In the United States, young adults are more than twice as likely as older Americans to cyber-stalk their current or former romantic partners. New research by NortonLifeLock found three in five Gen Z and Millennial American adults who have been in a romantic relationship (60% of those ages 18 to 39) have digitally checked up on an ex or current squeeze without their knowledge or consent.  The same admission was made by just a quarter (24%) of…

Read More
1 2,311 2,312 2,313 2,314 2,315 2,686