Content Paint

cybersecurity

ChatGPT DDoS attack

Incident follows record HTTP2 "Rapid Reset" attack warnings as well as CISA note on exploitation of Service Location Protocol vulnerability for DDoS purposes.

Why firewalls, VPNs and hypervisors are a hacker's new favourite target

TTPs and telemetry suggest a real focus on zero days and appliances by Chinese APTs.

Amazon veteran Charlie Bell is leading a software security overhaul at Microsoft

Biggest overhaul of Redmond's security in 20 years sees promises of "code analysis [of] 100% of commercial product”, cryptographic keys to be kept in a hardened Azure HSM, more.

As SEC’s SolarWinds charges reverberate, companies scrutinise cyber risk disclosures

'Do not state anything that is subjective and avoid adjectives (e.g., "state of the art," "mature," "advanced," "appropriate," "comprehensive," or "reasonable")' say experts.

Citrix Bleed: Two ransomware groups now exploiting bug for initial access

Here's what you need to do to reduce the threat posed by CVE-2023-4966. But don't delay.

Zero day in free Roundcube webmail service exploited to target governments

Despite the low sophistication of the group’s toolset, it is a threat to governments in Europe because... a significant number of internet-facing applications are not regularly updated although they are known to contain vulnerabilities.”

English-speaking ransomware group expanding ops, deploying diverse tools, threats

Both blunt and more advanced social engineering approaches used for initial access; the group also has sophisticated hands-on-keyboards capabilities and a diverse toolset.

Okta breach looks worse as BeyondTrust, Cloudflare, Password1 report impact, flag concerns

Concern at IAM vendor Okta's response mounts as BeyondTrust details concerns, Cloudflare calls for customers to press harder on "further information regarding potential impact to your organization"

Was this the most vanilla ransomware attack ever?

"VPNs pose a threat to enterprise security. They create a path in the network perimeter and provide access to network resources after authentication..."

Search the site

Your link has expired. Please request a new one.
Your link has expired. Please request a new one.
Your link has expired. Please request a new one.
Great! You've successfully signed up.
Great! You've successfully signed up.
Welcome back! You've successfully signed in.
Success! You now have access to additional content.