Content Paint

Security

As SEC’s SolarWinds charges reverberate, companies scrutinise cyber risk disclosures

'Do not state anything that is subjective and avoid adjectives (e.g., "state of the art," "mature," "advanced," "appropriate," "comprehensive," or "reasonable")' say experts.

boeing hack confirmed lockbit

"We are actively investigating the incident and coordinating with law enforcement and regulatory authorities.”

SolarWinds sued by SEC, SolarWinds CISO also charged with fraud

SolarWinds’ poor controls... false and misleading statements and omissions, and the other misconduct... would have violated the federal securities laws even if SolarWinds had not experienced a major, targeted cybersecurity attack"

Citrix Bleed: Two ransomware groups now exploiting bug for initial access

Here's what you need to do to reduce the threat posed by CVE-2023-4966. But don't delay.

Zero day in free Roundcube webmail service exploited to target governments

Despite the low sophistication of the group’s toolset, it is a threat to governments in Europe because... a significant number of internet-facing applications are not regularly updated although they are known to contain vulnerabilities.”

English-speaking ransomware group expanding ops, deploying diverse tools, threats

Both blunt and more advanced social engineering approaches used for initial access; the group also has sophisticated hands-on-keyboards capabilities and a diverse toolset.

Okta breach looks worse as BeyondTrust, Cloudflare, Password1 report impact, flag concerns

Concern at IAM vendor Okta's response mounts as BeyondTrust details concerns, Cloudflare calls for customers to press harder on "further information regarding potential impact to your organization"

Matrix hits 115 million users, as founders look to add  OpenID Connect, enterprise features

Major overhaul of the open source communications protocol and standard looms, amid steady user base growth

Was this the most vanilla ransomware attack ever?

"VPNs pose a threat to enterprise security. They create a path in the network perimeter and provide access to network resources after authentication..."

Search the site

Your link has expired. Please request a new one.
Your link has expired. Please request a new one.
Your link has expired. Please request a new one.
Great! You've successfully signed up.
Great! You've successfully signed up.
Welcome back! You've successfully signed in.
Success! You now have access to additional content.