Cyber Security CISO Corner: What Cyber Labor Shortage?; Trouble Meeting SEC Disclosure Deadlines May 17, 2024 darkreading.com Our collection of the most relevant reporting and industry perspectives for those guiding cybersecurity strategies and focused on SecOps. Also…
Cyber Security Singapore Cybersecurity Update Puts Cloud Providers on Notice May 14, 2024 darkreading.com The nation amends its Cybersecurity Act, giving its primary cybersecurity agency more power to regulate critical infrastructure and third parties,…
Cyber Security U.S. Charges Russian Man as Boss of LockBit Ransomware Group May 7, 2024 krebsonsecurity.com The United States joined the United Kingdom and Australia today in sanctioning 31-year-old Russian national Dmitry Yuryevich Khoroshev as the…
Cyber Security Amnesty International Cites Indonesia as a Spyware Hub May 5, 2024 darkreading.com The growing amount of surveillance technology being deployed in the country is concerning due to Indonesia's increasing blows to citizens'…
Cyber Security Intel Harnesses Hackathons to Tackle Hardware Vulnerabilities Apr 26, 2024 darkreading.com The semiconductor manufacturing giant's security team describes how hardware hackathons, such as Hack@DAC, have helped chip security by finding and…
Cyber Security Licensed to Bill? Nations Mandate Certification & Licensure of Cybersecurity Pros Apr 22, 2024 darkreading.com Malaysia, Singapore, and Ghana are among the first countries to pass laws that require cybersecurity firms — and in some…
Cyber Security Singapore Sets High Bar in Cybersecurity Preparedness Apr 3, 2024 darkreading.com While Singaporean organizations have adopted the majority of their government's cybersecurity recommendations, they aren't immune: More than eight in 10…
Cyber Security Cloud Email Filtering Bypass Attack Works 80% of the Time Mar 29, 2024 darkreading.com A majority of enterprises that employ cloud-based email spam filtering services are potentially at risk, thanks to a rampant tendency…
Cyber Security The Not-so-True People-Search Network from China Mar 20, 2024 krebsonsecurity.com It's not unusual for the data brokers behind people-search websites to use pseudonyms in their day-to-day lives (you would, too).…
Technology New WogRAT malware abuses online notepad service to store malware Mar 5, 2024 bleepingcomputer.com A new malware dubbed 'WogRAT' targets both Windows and Linux in attacks abusing an online notepad platform named 'aNotepad' as…
CISO Corner: What Cyber Labor Shortage?; Trouble Meeting SEC Disclosure Deadlines
Our collection of the most relevant reporting and industry perspectives for those guiding cybersecurity strategies and focused on SecOps. Also…
Singapore Cybersecurity Update Puts Cloud Providers on Notice
The nation amends its Cybersecurity Act, giving its primary cybersecurity agency more power to regulate critical infrastructure and third parties,…
U.S. Charges Russian Man as Boss of LockBit Ransomware Group
The United States joined the United Kingdom and Australia today in sanctioning 31-year-old Russian national Dmitry Yuryevich Khoroshev as the…
Amnesty International Cites Indonesia as a Spyware Hub
The growing amount of surveillance technology being deployed in the country is concerning due to Indonesia's increasing blows to citizens'…
Intel Harnesses Hackathons to Tackle Hardware Vulnerabilities
The semiconductor manufacturing giant's security team describes how hardware hackathons, such as Hack@DAC, have helped chip security by finding and…
Licensed to Bill? Nations Mandate Certification & Licensure of Cybersecurity Pros
Malaysia, Singapore, and Ghana are among the first countries to pass laws that require cybersecurity firms — and in some…
Singapore Sets High Bar in Cybersecurity Preparedness
While Singaporean organizations have adopted the majority of their government's cybersecurity recommendations, they aren't immune: More than eight in 10…
Cloud Email Filtering Bypass Attack Works 80% of the Time
A majority of enterprises that employ cloud-based email spam filtering services are potentially at risk, thanks to a rampant tendency…
The Not-so-True People-Search Network from China
It's not unusual for the data brokers behind people-search websites to use pseudonyms in their day-to-day lives (you would, too).…
New WogRAT malware abuses online notepad service to store malware
A new malware dubbed 'WogRAT' targets both Windows and Linux in attacks abusing an online notepad platform named 'aNotepad' as…