Category: EN

#ISC2Congress: CISO Best Practices for Managing Cyber Risk

Two leading CISOs provide best practice tips for CISOs on undertaking a sustainable cyber risk management program This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: #ISC2Congress: CISO Best Practices for Managing Cyber Risk

Operation Triangulation iOS Attack Details Revealed

Kaspersky said the attack exploited five vulnerabilities, four of which were unknown zero-days This article has been indexed from http://www.infosecurity-magazine.com/rss/news/76/application-security/ Read the original article: Operation Triangulation iOS Attack Details Revealed

The fallout from the Okta breach continues

On September 29, 2023, 1Password discovered suspicious activity on its Okta tenant. The investigation revealed that the threat actor used a HAR file stolen in the recent Okta breach to access the […] Thank you for being a Ghacks reader.…

Beware of the Flipper Zero Bluetooth spam attacks

As we previously covered, Flipper Zero is a portable, open-source multi-tool device for pentesters and geeks. It can be used to interact with a variety of electronic devices, including RFID tags, radio […] Thank you for being a Ghacks reader.…

Ransomware news headlines trending on Google

BHI Energy recently issued a statement revealing that its servers fell victim to a ransomware attack orchestrated by a group known as Akira in June of this year. The breach was not detected until July. The attackers gained unauthorized access…

Octo Tempest Attacking Organizations to Steal Financial Data

Microsoft has been closely monitoring the Octo Tempest, a significant financial threat organization.  This threat group employs various strategies and TTPs for worldwide extortion, making it one of the most sophisticated financial threat groups. Octo Tempest, a native English-speaking group…

Complex Spy Platform StripedFly Bites 1M Victims

Sophisticated Windows and Linux malware for stealing data and conducting cyber espionage has flown under the radar, disguised as a cryptominer. This article has been indexed from Dark Reading Read the original article: Complex Spy Platform StripedFly Bites 1M Victims

Google adds generative AI threats to its bug bounty program

Google has expanded its vulnerability rewards program (VRP) to include attack scenarios specific to generative AI. In an announcement shared with TechCrunch ahead of publication, Google said: “We believe expanding the VRP will incentivize research around AI safety and security…