Tag: information security

Cyber (In)Securities – Issue 159 – Snapshot Edition

Cyber (In)Securities – Issue 159 – Snapshot Edition

(In)Securities | Edition 159: ICS Alerts, IntelBroker Fallout, and Cybercrime Crackdowns This edition covers rising threats to critical infrastructure, major vulnerability disclosures, and global law enforcement action. CISA has released new Industrial Control Systems advisories and expanded its Known Exploited Vulnerabilities catalog. Meanwhile, the arrest 

Cyber (In)Securities – Issue 158 – Snapshot Edition

Cyber (In)Securities – Issue 158 – Snapshot Edition

(In)Securities | Edition 158: Internet Users Advised to Change Passwords After 16bn Logins Exposed This edition dives into the massive RockYou2024 data dump, critical Citrix NetScaler flaws, and global breaches spanning Canada, Iran, and South Africa. We track MFA bypasses used by Russian hackers, malware 

Too Big to Fail, Too Centralised to Survive: What 16 Billion Leaked Logins Tell Us About the Wrong Kind of Scale

Too Big to Fail, Too Centralised to Survive: What 16 Billion Leaked Logins Tell Us About the Wrong Kind of Scale

When 16 billion credentials turn up in a single breach compilation, it should shake us. But it doesn’t. Not anymore. And that’s the problem. In the latest reminder that password-based security is a brittle mess, security researchers revealed a mega-leak containing more than 16 billion 

Cyber (In)Securities – Issue 153 

Cyber (In)Securities – Issue 153 

You can download this edition by clicking the three dots icon on the bottom right and selecting Download PDF File. To enlarge the view, click the fullscreen icon on the bottom right. All article titles inside the flipbook are clickable links.

Cyber (In)Securities – Issue 151 – Snapshot Edition

Cyber (In)Securities – Issue 151 – Snapshot Edition

You can download this edition using the download icon at the bottom. To enlarge the view, click the fullscreen icon on the bottom right. All article titles inside the flipbook are clickable links.

Cyber (In)Securities – Issue 144

News Quantum computer threat spurring quiet overhaul of internet securityCyberscoop – Greg Otto Pro-Russia hacktivists bombard Dutch public orgs with DDoS attacksBleepingComputer – Bill Toulas Dems look to close the barn door after top DOGE dog has boltedThe Register – Brandon Vigliarolo Canadian Electric Utility 

Cyber (In)Securities – Issue 143

Cyber (In)Securities – Issue 143

News Cybersecurity CEO accused of running malware on hospital PC blabs about it on LinkedInThe Register – Brandon Vigliarolo Cybersecurity experts issue response to Trump order targeting Chris Krebs, SentinelOneCyberscoop – Greg Otto Marks & Spencer breach linked to Scattered Spider ransomware attackBleepingComputer – Lawrence 

Cyber (In)Securities – Issue 139

Cyber (In)Securities – Issue 139

Information Security News Autonomous, GenAI-Driven Attacker Platform Enters the ChatDark Reading – Elizabeth Montalbano EncryptHub’s dual life: Cybercriminal vs Windows bug-bounty researcherBleepingComputer – Bill Toulas Voluntary ‘Pall Mall Process’ seeks to curb spyware abusesCyberscoop – Tim Starks That massive GitHub supply chain attack? It all 

Cyber (In)Securities – Issue 138

Cyber (In)Securities – Issue 138

Information Security News Disclosure Drama Clouds CrushFTP Vulnerability ExploitationDark Reading – Rob Wright CISA warns of Fast Flux DNS evasion used by cybercrime gangsBleepingComputer – Bill Toulas Google Quick Share Bug Bypasses Allow Zero-Click File TransferDark Reading – Tara Seals China-Linked Threat Group Exploits Ivanti 

Cyber (In)Securities – Issue 136

Cyber (In)Securities – Issue 136

Information Security News Italian government approved use of spyware on members of refugee NGO, MPs told The Guardian by Angela Giuffrida & Stephanie KirchgaessnerItalian lawmakers have been informed that spyware was authorised against members of a refugee NGO, sparking fierce backlash over potential human rights