CyberSecurity Blog

Digital Identity Bill Passes Key Senate Milestone

Jeremy Grant Explains How Bill Would Create Standards, Funding for Online IDs A Senate committee this week approved a bill that would create governmentwide standards for identity verification and provide grants to help states and local agencies upgrade ID systems and offer online digital identity services. Supporter Jeremy Grant hopes to see a full Senate…
Read more

North Korea Trojanizing Open-Source Software

Lazarus Group Uses Social Engineering to Manipulate Victims to Download Malware North Korea is using weaponized versions of open-source utilities to spy on the technology, defense and entertainment sectors worldwide. Microsoft says it spotted fake profiles of supposed job recruiters who really are Pyongyang hackers manipulating victims into downloading Trojans.http://dlvr.it/SZR7CV

Apple Products Released at Far Out Event

ICYMI: On September 7, 2022, Apple hosted its annual product release event at one pm Eastern Time (ET). Tim Cook, Apple’s CEO, took the stage at the Far Out event held at the …http://dlvr.it/SZNkHC

North Korean Trojanizing Open Source Software

ICYMI: Lazarus Group Uses Social Engineering to Manipulate Victims Into Downloading Malware North Korean is using weaponized versions of open source utilities to spy on the technology, defense and entertainment sectors worldwide. Microsoft says it spotted fake profiles of supposed job recruiters who really are Pyongyang hackers manipulating victims into downloading Trojans.http://dlvr.it/SZLtzL

Microsoft Teams Vulnerability Discovered

ICYMI: Microsoft Teams is a part of the 365 product family and is used by more than 270 million people for exchanging text messages, videoconferencing, and file storage. In August of 2022, the …http://dlvr.it/SZLQGS

How To Optimize Your Website With SEO

So, you’ve built your company’s website. That’s great news and a major milestone, for sure.  Unfortunately, your work is just beginning.  If you want anybody to be able to find you among …http://dlvr.it/SZLPmk

North Korean Trojanizing Open Source Software

Lazarus Group Uses Social Engineering to Manipulate Victims Into Downloading Malware North Korean is using weaponized versions of open source utilities to spy on the technology, defense and entertainment sectors worldwide. Microsoft says it spotted fake profiles of supposed job recruiters who really are Pyongyang hackers manipulating victims into downloading Trojans.http://dlvr.it/SZJRh0

Zscaler Buys Workflow Automation Firm ShiftRight for $25.6M

ICYMI: ShiftRight Acquisition to Simplify Management, Operations Across DLP, CASB & CNAPP Zscaler has bought out of stealth a startup established by the founders of Lacework to automate security management and dramatically reduce incident resolution time. ShiftRight will give customers real-time visibility into their security posture and help them manage an influx of risks and…
Read more

Microsoft 365 Accounts Targeted In New BEC Scam

Recently, researchers at Mitiga have sounded the alarm about a new Business Email Compromise (BEC) campaign.  They discovered evidence of the campaign responding to another incident and have watched the campaign grow …http://dlvr.it/SZHr1b

Examining What Went Wrong for Optus

ICYMI: The latest edition of the ISMG Security Report discusses what went wrong for Optus in the wake of one of Australia’s biggest data breach incidents, the state of code security today and the growing trend of private equity firms pursuing take-private deals.http://dlvr.it/SZHbk2