ICYMI: Lazarus Group Uses Social Engineering to Manipulate Victims Into Downloading Malware North Korean is using weaponized versions of open source utilities to spy on the technology, defense and entertainment sectors worldwide. Microsoft says it spotted fake profiles of supposed job recruiters who really are Pyongyang hackers manipulating victims into downloading Trojans.http://dlvr.it/SZLtzL
ICYMI: Microsoft Teams is a part of the 365 product family and is used by more than 270 million people for exchanging text messages, videoconferencing, and file storage. In August of 2022, the …http://dlvr.it/SZLQGS
So, you’ve built your company’s website. That’s great news and a major milestone, for sure. Unfortunately, your work is just beginning. If you want anybody to be able to find you among …http://dlvr.it/SZLPmk
Lazarus Group Uses Social Engineering to Manipulate Victims Into Downloading Malware North Korean is using weaponized versions of open source utilities to spy on the technology, defense and entertainment sectors worldwide. Microsoft says it spotted fake profiles of supposed job recruiters who really are Pyongyang hackers manipulating victims into downloading Trojans.http://dlvr.it/SZJRh0
ICYMI: ShiftRight Acquisition to Simplify Management, Operations Across DLP, CASB & CNAPP Zscaler has bought out of stealth a startup established by the founders of Lacework to automate security management and dramatically reduce incident resolution time. ShiftRight will give customers real-time visibility into their security posture and help them manage an influx of risks and…
Read more
Recently, researchers at Mitiga have sounded the alarm about a new Business Email Compromise (BEC) campaign. They discovered evidence of the campaign responding to another incident and have watched the campaign grow …http://dlvr.it/SZHr1b
ICYMI: The latest edition of the ISMG Security Report discusses what went wrong for Optus in the wake of one of Australia’s biggest data breach incidents, the state of code security today and the growing trend of private equity firms pursuing take-private deals.http://dlvr.it/SZHbk2
ICYMI: Cybersecurity Veteran Focuses on Advising Government, Financial Sectors Over his 23-year career in cybersecurity, Tom Kellermann has focused on policy, endpoints and even strategic investments. Now, in his new role as senior vice president of cyber strategy at Contrast Security, his mission is to protect code security – particularly in the public and financial…
Read more
ICYMI: Vulnerabilities Appear Not to Have Been Exploited in the Wild Chat app WhatsApp patched two memory-related flaw that could be exploited by an attacker as a first step to installing smartphone malware on Android or Apple devices. WhatsApp vulnerabilities can be highly valuable to malicious actors.http://dlvr.it/SZF1Lc
ShiftRight Acquisition to Simplify Management, Operations Across DLP, CASB & CNAPP Zscaler has bought out of stealth a startup established by the founders of Lacework to automate security management and dramatically reduce incident resolution time. ShiftRight will give customers real-time visibility into their security posture and help them manage an influx of risks and incidents.http://dlvr.it/SZDbZn