Senator discusses priorities for advancing national cybersecurity legislation

Senator discusses priorities for advancing national cybersecurity legislation

Sen. Mark Warner was on a panel at a webinar sponsored by the U.S. Chamber of Commerce Tuesday. He said he is optimistic that new legislation will pass making breach notification mandatory. Image: iStock/Greg Meland The chairman of the Senate Select Committee on Intelligence Sen. Mark Warner (D-Virginia) said he is “very optimistic” that national cybersecurity legislation can pass that will be “broadly bipartisan with broad industry support” during a U.S. Chamber of Commerce-sponsored webinar…

Read More

Tenable finalise l’acquisition d’Alsid et lance Tenable.ad pour sécuriser les environnements Active Directory

Tenable finalise l’acquisition d’Alsid et lance Tenable.ad pour sécuriser les environnements Active Directory

Tenable Holdings, Inc. (« Tenable ») (Nasdaq : TENB), la société à l’origine du concept de Cyber Exposure, annonce aujourd’hui avoir finalisé l’acquisition d’Alsid SAS («Alsid»), leader du marché de la sécurité Active Directory, le 26 avril 2021. Cette acquisition combine les atouts complémentaires de deux innovateurs en matière de cybersécurité et marque une étape importante dans la vision de Tenable, qui consiste à aider les entreprises à comprendre et à réduire les cyber-risques sur…

Read More

Tenable Completes Acquisition Of Alsid And Launches Tenable.ad To Secure Active Directory Environments

Tenable Completes Acquisition Of Alsid And Launches Tenable.ad To Secure Active Directory Environments

Tenable Holdings, Inc. (“Tenable”) (Nasdaq: TENB), the Cyber Exposure company, today announced that it completed the acquisition of Alsid SAS (“Alsid”), a leader in securing Active Directory, on April 26, 2021. The acquisition combines the complementary strengths of two cybersecurity innovators and marks an important milestone in Tenable’s vision to help organizations understand and reduce cyber risk across the entire attack surface. Today, Tenable also announced the availability of Tenable.ad, a new solution leveraging Alsid…

Read More

Kik Tip Leads to Kindergarten Teacher’s Arrest

Kik Tip Leads to Kindergarten Teacher’s Arrest

A kindergarten teacher from Indiana has been charged with multiple counts of child exploitation and possessing child sexual abuse material (CSAM) following a cyber-tip. An investigation was launched into the online activities of 49-year-old Brian Lee Jakes in February after a tip was sent into the National Center for Missing and Exploited Children. The tipster said that Jakes had been using the messaging app Kik to share images of children being sexually assaulted. A search of Jakes’…

Read More

A new Linux Botnet abuses IaC Tools to spread and other emerging techniques

A new Linux Botnet abuses IaC Tools to spread and other emerging techniques

A new Linux botnet uses Tor through a network of proxies using the Socks5 protocol, abuses legitimate DevOps tools, and other emerging techniques. Researchers from Trend Micro have spotted a new Linux botnet employing multiple emerging techniques among cyber-criminals, including the use of Tor proxies, the abuse of legitimate DevOps tools, and the removal or deactivation of competing malware. Experts highlighted that this Linux botnet downloads all the files it needs from the Tor network, including legitimate binaries like…

Read More

Anomali Cyber Watch:  HabitsRAT Targeting Linux and Windows Servers, Lazarus Group Targetting South Korean Orgs, Multiple Zero-Days and More

Anomali Cyber Watch:  HabitsRAT Targeting Linux and Windows Servers, Lazarus Group Targetting South Korean Orgs, Multiple Zero-Days and More

The various threat intelligence stories in this iteration of the Anomali Cyber Watch discuss the following topics: APT, Android Malware, RATs, Phishing, QLocker Ransomware and Vulnerabilities. The IOCs related to these stories are attached to Anomali Cyber Watch and can be used to check your logs for potential malicious activity. Figure 1 – IOC Summary Charts. These charts summarize the IOCs attached to this magazine and provide a glimpse of the threats discussed. Trending Cyber…

Read More

Threat Actors Impersonate Chase Bank

Threat Actors Impersonate Chase Bank

Threat researchers at Armorblox have come across two new phishing scams targeting customers of JPMorgan Chase Bank.  Both attacks deployed social engineering and brand impersonation tactics in an attempt to steal customers’ login credentials. While one scam involved an email that appeared to contain a credit card statement, the other impersonated a locked account workflow to falsely inform victims that access to their account had been blocked following the detection of unusual login activity. Amorblox researchers said…

Read More

“Crypto Dictionary: 500 Cryptographic Tidbits for the Curious” is a crash course in ciphers and cryptids

“Crypto Dictionary: 500 Cryptographic Tidbits for the Curious” is a crash course in ciphers and cryptids

Security expert publishes coffee table book for cryptographers to explain the science of secrecy. Image: iStockphoto/ivanmollov What do the Bass0matic, blockchain and zero-knowledge proofs have in common? Each term shows up in Jean-Philippe Aumasson’s new publication: “Crypto Dictionary: 500 Cryptographic Tidbits for the Curious.” Aumasson is the chief security officer and cofounder of Taurus Group, a Swiss fintech company and the author of “Serious Cryptography: A Practical Introduction to Modern Encryption.”   Aumasson writes in the preface…

Read More

Access control systems (ACS) data can help organizations get back to the office

Access control systems (ACS) data can help organizations get back to the office

Access control systems (ACS) data can help organizations get back to the office | 2021-04-27 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie…

Read More

The critical role security technology plays in the fight against COVID-19

The critical role security technology plays in the fight against COVID-19

The critical role security technology plays in the fight against COVID-19 | 2021-04-27 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to…

Read More
1 2,458 2,459 2,460 2,461 2,462 2,731