HomeSecurity

Security

Cyber Security Today, May 2, 2022 – More on how the Conti ransomware gang works, individuals victimized by ransomware, news on wiperware and more

This episode reports on ransomware, wiperware, the latest attacks by APT29 and a warning to NAS users

Canada, U.S. in group of 61 nations vowing to work for an open internet

Canada, the U.S., and 59 other countries have signed a declaration vowing to work for an open, free, global, interoperable, reliable, and secure internet. It...

Telus launches personal security beacons disguised as jewellery

Telus has launched a line of personal safety beacons disguised as charms. The SmartWear Security charms, created in partnership with InvisaWear, allow the wearer to...

Cyber Security Today, April 27, 2022 – Lots of software still has log4j2 vulnerabilities, hackers took only days to exploit a VMware vulnerability and...

This episode reports on Log4Shell vulnerabilities, the speedy work of hackers, a website that catalogs one hacker's efforts to compromise the NPM library and a risky wireless brake light solution

Cyber Security Today, April 25, 2022 – Report shows how Lapsus$ gang was successful, and patches for Atlassian, Java and Amazon software are released

This episode talks about a report that shows how Lapsus$ gang was successful, and patches for Atlassian, Java and Amazon software are released

Canada, U.S. in group planning to bridge global privacy rules

Canada, the U.S., and five other Pacific rim countries will try to create international rules to bridge different regulatory approaches to data protection and...

Cyber Security Today, April 22, 2022 – Backgrounder on BlackCat ransomware gang, movement from REvil and millions stolen from another DeFi system

This episode reports on an FBI paper on the BlackCat ransomware gang, the possible return of REvil, the theft of millions from a DeFi project and more

Cyber Security Today, April 20, 2022 – A record year for zero-day bugs, how often do you test backups, and the world’s biggest penetration...

This episode reports on zero-day bugs, testing data recovery processes, a NATO cyberwar game and more

Cyber Security Today, April 18, 2022 – Ties are alleged between ransomware and extortion gangs, and a warning to app developers

This episode reports on alleged ties between the Conti ransomware and Karakurt extortion gangs, a warning to app developers from GitHub and a new webisite where companies can buy data stolen from competitors 

Cyber Security Today, April 18, 2022 – Ties are alleged between ransomware and extortion gangs, and a warning to app developers

This episode reports on alleged ties between the Conti ransomware and Karakurt extortion gangs, a warning to app developers from GitHub and a new webisite where companies can buy data stolen from competitors 

Cyber Security Today, April 15, 2022 – A new botnet discovered, low MFA adoption and a Struts bug finally patched

This episode reports on the finding of a new botnet, low MFA adoption in US critical infrastructure sector a Struts bug finally patched and a fix issued for hospital robot carts

How SMBs can create an identity management strategy

Identity management is crucial for an effective cybersecurity defence, but isn't as hard as some organizations believe, experts said at a webinar as part...

Cyber Security Today, Wednesday April 13, 2022 – Updated malware attacks a Ukraine power company, the RaidForums darkweb site is seized, a new Hafnium...

This episode reports on the Sandworm group's latest attack on a Ukraine power company, the closing of the RaidForums darkweb marketplace, a new Hafnium attack uses Windows Scheduler to launch attacks and more patches issued

Cyber Security Today, April 11, 2022 -Malware aimed at the Spring Java framework, AWS Lambda and in Android apps

This episode reports on the Mirai botnet abusing the unpatched Spring Java framework, a data breach at toolmaker Snap-on, action against threat actors by Microsoft and Meta and more

Cyber Security Today, April 8, 2022 – Software developers admit releasing poor code, product warnings from Palo Alto Networks and VMware, and more

This episode reports on a survey of application developers, a phony voicemail scam and more

Popular Posts

Security Blogs

Slideshows

How to equip students with the tools to succeed

Many teams used to spend the entire summer updating student devices. But now the Windows 10 ability to manage the devices without having to...

Stay cyber-safe this holiday season

The holidays are a busy time of year, packed with family gatherings, festive parties and hours spent lining up in crowded stores to buy...

How upgrading your network can deliver a competitive advantage

In 2014, Gartner reported that the average cost of network downtime to an enterprise was $5,600 per minute. And even if the network isn't...

The top three network security challenges for 2016

Securing the network has always been a challenge, but it’s only getting more complex, thanks to the rise of cloud applications, programmable networks and...