Technology

A Simple Formula for Getting Your IT Security Budget Approved

Although there is a greater awareness of cybersecurity threats than ever before, it is becoming increasingly difficult for IT departments to get their security budgets approved. Security budgets seem to shrink each year and IT pros are constantly being asked to do more with less. Even so, the situation may not be hopeless. There are […]

A Simple Formula for Getting Your IT Security Budget Approved Read More »

State-Backed Hackers Targeting Journalists in Widespread Espionage Campaigns

Nation-state hacking groups aligned with China, Iran, North Korea, and Turkey have been targeting journalists to conduct espionage and spread malware as part of a series of campaigns since early 2021. “Most commonly, phishing attacks targeting journalists are used for espionage or to gain key insights into the inner workings of another government, company, or

State-Backed Hackers Targeting Journalists in Widespread Espionage Campaigns Read More »

Former CIA Engineer Convicted of Leaking ‘Vault 7’ Hacking Secrets to WikiLeaks

Joshua Schulte, a former programmer with the U.S. Central Intelligence Agency (CIA), has been found guilty of leaking a trove of classified hacking tools and exploits dubbed Vault 7 to WikiLeaks. The 33-year-old engineer had been charged in June 2018 with unauthorized disclosure of classified information and theft of classified material. Schulte also faces a separate trial on charges related to

Former CIA Engineer Convicted of Leaking ‘Vault 7’ Hacking Secrets to WikiLeaks Read More »

New UEFI Firmware Vulnerabilities Impact Several Lenovo Notebook Models

Consumer electronics maker Lenovo on Tuesday rolled out fixes to contain three security flaws in its UEFI firmware affecting over 70 product models. “The vulnerabilities can be exploited to achieve arbitrary code execution in the early phases of the platform boot, possibly allowing the attackers to hijack the OS execution flow and disable some important security features,”

New UEFI Firmware Vulnerabilities Impact Several Lenovo Notebook Models Read More »

U.S. FTC Vows to Crack Down on illegal Use and Sharing of Citizens’ Sensitive Data

The U.S. Federal Trade Commission (FTC) warned this week that it will crack down on tech companies’ illegal use and sharing of highly sensitive data and false claims about data anonymization. “While many consumers may happily offer their location data in exchange for real-time crowd-sourced advice on the fastest route home, they likely think differently

U.S. FTC Vows to Crack Down on illegal Use and Sharing of Citizens’ Sensitive Data Read More »

New ‘Retbleed’ Speculative Execution Attack Affects AMD and Intel CPUs

Security researchers have uncovered yet another vulnerability affecting numerous older AMD and Intel microprocessors that could bypass current defenses and result in Spectre-based speculative-execution attacks. Dubbed Retbleed by ETH Zurich researchers Johannes Wikner and Kaveh Razavi, the issues are tracked as CVE-2022-29900 (AMD) and CVE-2022-29901 (Intel), with the chipmakers releasing 

New ‘Retbleed’ Speculative Execution Attack Affects AMD and Intel CPUs Read More »

5 Questions You Need to Ask About Your Firewall Security

Often, organizations think of firewall security as a one-and-done type of solution. They install firewalls, then assume that they are “good to go” without investigating whether or not these solutions are actually protecting their systems in the best way possible. “Set it and forget it!” Instead of just relying on firewalls and assuming that they

5 Questions You Need to Ask About Your Firewall Security Read More »

Microsoft Warns of Large-Scale AiTM Phishing Attacks Against Over 10,000 Organizations

Microsoft on Tuesday disclosed that a large-scale phishing campaign targeted over 10,000 organizations since September 2021 by hijacking Office 365’s authentication process even on accounts secured with multi-factor authentication (MFA). “The attackers then used the stolen credentials and session cookies to access affected users’ mailboxes and perform follow-on business email compromise (BEC)

Microsoft Warns of Large-Scale AiTM Phishing Attacks Against Over 10,000 Organizations Read More »

Microsoft Windows Autopatch is Now Generally Available for Enterprise Systems

Microsoft on Monday announced the general availability of a feature called Autopatch that automatically keeps Windows and Office software up-to-date on enrolled endpoints. The launch, which comes a day before Microsoft is expected to release its monthly round of security patches, is available for customers with Windows Enterprise E3 and E5 licenses. It, however, doesn’t

Microsoft Windows Autopatch is Now Generally Available for Enterprise Systems Read More »

Avoiding Death by a Thousand Scripts: Using Automated Content Security Policies

Businesses know they need to secure their client-side scripts. Content security policies (CSPs) are a great way to do that. But CSPs are cumbersome. One mistake and you have a potentially significant client-side security gap. Finding those gaps means long and tedious hours (or days) in manual code reviews through thousands of lines of script

Avoiding Death by a Thousand Scripts: Using Automated Content Security Policies Read More »