Google Spices Up Supply China Security with SLSA Framework

Google Spices Up Supply China Security with SLSA Framework

Google has proposed a new framework to mitigate the growing risks posed by attacks on the software supply chain. The Supply Chain Levels for Software Artifacts (SLSA, pronounced “salsa”) is designed to ensure the integrity of software artifacts across the entire supply chain. It’s based on Google’s own Binary Authorization for Borg framework, which the tech giant has been using as standard for all its production workloads for over eight years. “The goal of SLSA is…

Read More

Infosecurity Europe 2021 Postpones Live Event

Infosecurity Europe 2021 Postpones Live Event

Infosecurity Europe has announced that it is postponing the live event due to run at London Olympia in July, following the government’s delay in lifting the final COVID-19 restrictions. Infosecurity Europe will instead deliver a virtual exhibition and conference from 13-15 July 2021, the original dates of the event. The in-person event will now be held in 2022. The plan, before government restriction lifting was delayed, was to combine both live and online elements of Infosecurity…

Read More

Novel Phishing Attack Uses Google Drive and Docs

Novel Phishing Attack Uses Google Drive and Docs

Enterprising cyber-criminals have found a way to create convincing phishing emails which abuse Google Docs and Drive functionality to bypass security filters, according to Avanan. Researchers at the email security vendor claimed this is the first time such techniques have been used to piggyback on a popular service like Google’s. The email that victims receive contains what appears to be a legitimate Google Docs link, Avanan explained in a blog post. Clicking through takes the user to…

Read More

Carnival Confirms Another Security Breach Impacting Staff and Passengers

Carnival Confirms Another Security Breach Impacting Staff and Passengers

One of the world’s largest cruise ship operators has disclosed a data breach from mid-March, impacting an unspecified number of customers, employees, and crew. Carnival Corporation runs many of the globe’s leading cruise lines, including P&O, Cunard and Carnival Cruise Line. According to a data breach notification letter sent to customers and seen by Infosecurity, the firm detected unauthorized third-party access to a “limited number” of email accounts on March 19. “The impacted information includes data routinely…

Read More

Getting employees invested: Overcoming complacency to emphasize security

Getting employees invested: Overcoming complacency to emphasize security

Getting employees invested: Overcoming complacency to emphasize security | 2021-06-18 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. …

Read More

New possibilities for innovating at the IoT Edge

New possibilities for innovating at the IoT Edge

This blog was co-written by Mirko Grabel, Technical Marketing Leader, and Flo Pachinger, Developer Advocate Get ready for an all-new Cisco industrial router: the Cisco Catalyst IR1800 Rugged Series. With many new interfaces and modules backed by a stronger CPU and more memory, the IR1800 series gives IoT application developers new possibilities for innovating at the IoT Edge, for example to host applications that can extract and transform IoT data right at the edge. The…

Read More

Manage the Cloud Permissions Gap to Achieve Zero Trust

Manage the Cloud Permissions Gap to Achieve Zero Trust

The Cloud Permissions Gap exposes organizations to highly exploitable risk combined with the inability to implement and manage Zero Trust policies. By Raj Mallempati, CloudKnox Security COO In 2020, when organizations were prioritizing digital transformation so they could pivot to remote work on an unprecedented scale, Gartner added a new category to its 2020 Hype Cycle for Identity and Access Management Technologies called Cloud Infrastructure Entitlement Management (CIEM). CIEM? Looks a lot like SIEM. CIEM…

Read More

A Billion CVS Records Exposed

A Billion CVS Records Exposed

More than a billion records were exposed after a misconfiguration error left a CVS Health cloud database without password protection. The 240GB of unsecured data was discovered by WebsitePlanet and security researcher Jeremiah Fowler in a cooperative investigation.  Because of the security oversight by CVS Health, which owns CVS Pharmacy and Aetna, a total of 1,148,327,940 records were exposed. Information that was left publicly accessible to anyone who knew how to look for it included customers’ search histories detailing their…

Read More

After Gaza ceasefire, MoleRATs hacking group continues to target Middle Eastern governments – CyberScoop

After Gaza ceasefire, MoleRATs hacking group continues to target Middle Eastern governments – CyberScoop

Written by Sean Lyngaas Jun 17, 2021 | CYBERSCOOP Days after Israel and Gaza-based militant group Hamas agreed to a ceasefire in May, Arabic-speaking hackers resumed an effort to break into government networks in the Middle East, according to research published Thursday. The hacking group, known as MoleRATs, sent target organizations a malware-laced PDF claiming to be a report on Hamas members meeting with the Syrian government, security firm Proofpoint said. The malicious code is…

Read More
1 3,530 3,531 3,532 3,533 3,534 4,074