Sat.Jul 02, 2022 - Fri.Jul 08, 2022

US Government Picks Quantum-Resistant Encryption Algorithms

Data Breach Today

Quantum Computers That Use Atom-Level States of Uncertainty Are a Matter of Time The National Institute of Standards and Technology today announced a first group of encryption algorithms designed to withstand the assault of a future quantum computer.

GUEST ESSAY: Rising cyber risks make business intelligence gathering more vital than ever

The Last Watchdog

Gathering intelligence has always been a key tool for organisational decision making – understanding the external operating environment is the ‘101’ for business. How can you grasp the challenges and opportunities for your company without a deep understanding of all the contributing factors that make the company tick? Related: We’re in the golden age of cyber espionage.

Risk 188

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

The Worst Hacks and Breaches of 2022 So Far

WIRED Threat Level

From cryptocurrency thefts to intrusions into telecom giants, state-backed attackers have had a field day in the year’s first half. Security Security / Cyberattacks and Hacks Security / National Security Security / Privacy

Cloud Misconfig Exposes 3TB of Sensitive Airport Data in Amazon S3 Bucket: 'Lives at Stake'

Dark Reading

The unsecured server exposed more than 1.5 million files, including airport worker ID photos and other PII, highlighting the ongoing cloud-security challenges worldwide

Cloud 111

Build Your Open Data Lakehouse on Apache Iceberg

Speaker: Veena Vasudevan and Jason Hughes

In this webinar, Dremio and AWS will discuss the most common challenges in data architecture and how to overcome them with an open data lakehouse architecture on AWS. Sign up now!

SHI Malware Attack Knocks Website, Email Offline for Days

Data Breach Today

SHI Took Its Public Websites and Email Offline to Assess the System Integrity A "coordinated and professional malware attack" against SHI left the company without email or public websites for days while the hack was investigated.

More Trending

The Danger of License Plate Readers in Post-Roe America

WIRED Threat Level

Known as ALPRs, this surveillance tech is pervasive across the US—and could soon be used by police and anti-abortion groups alike. Security Security / Privacy

Cybersecurity Has a Talent Shortage & Non-Technical People Offer a Way Out

Dark Reading

It's time to tap the large reservoir of talent with analytical skills to help tackle cybersecurity problems. Train workers in cybersecurity details while using their ability to solve problems

British Army's Twitter and YouTube Accounts Hijacked

Data Breach Today

Army Apologizes for Temporary Interruption; Full Investigation Underway The Twitter and YouTube accounts of the British Army were briefly taken over on Sunday evening by unidentified hacker(s) who posted content related to cryptocurrency and NFTs. The situation has now been resolved, but the U.K.

Emsisoft: Victims of AstraLocker and Yashma ransomware can recover their files for free

Security Affairs

Emsisoft has released a free decryption tool that allows victims of the AstraLocker and Yashma ransomware to recover their files without paying a ransom.

The Ultimate Guide to Hardening Windows Servers

IT Professional looking to harden your servers? ThreatLocker’s got you covered. The Ultimate Guide to Hardening Windows Servers offers tips and best practices to help mitigate cyber threats, better protect your servers, and secure your endpoints. Download today!

The hidden history of Db2

IBM Big Data Hub

In today’s world of complex data architectures and emerging technologies, databases can sometimes be undervalued and unrecognized.

Inside NIST's 4 Crypto Algorithms for a Post-Quantum World

Dark Reading

With the world potentially less than a decade away from breaking current encryption around critical data, researchers weigh in on planning for the post-quantum world

Unknown Hacker Steals Data of a Billion Chinese Citizens

Data Breach Today

Data Has Been Put on Sale for 10 Bitcoin, Equivalent to About $200,000 A misconfigured Alibaba private cloud server has led to the leak of around one billion Chinese nationals' personal details.

Sales 220

Cyberattacks against law enforcement are on the rise

Security Affairs

Experts observed an increase in malicious activity targeting law enforcement agencies at the beginning of Q2 2022.

Data Value Scorecard Report

This report examines the quantitative research of data leaders on data value and return on investment.

Discover your Information Advantage

OpenText Information Management

Welcome to OpenText. We are the information company. We power and protect information to elevate every person and every organization to gain the information advantage. In this day and time, information is ubiquitous and everywhere. It is scattered throughout organizations.

IT 96

ICYMI: Critical Cisco RCE Bug, Microsoft Breaks Down Hive, SHI Cyberattack

Dark Reading

Dark Reading's digest of the other don't-miss stories of the week, including a new ransomware targeting QNAP gear, and a destructive attack against the College of the Desert that lingers on

Russian Hackers Target Private Ukrainian Energy Firm

Data Breach Today

DTEK Group Alleges Russian Hackers/Military Behind Hybrid Attacks Ukrainian private energy firm DTEK group alleges that the Russian federation has carried out a cyberattack against its facilities, crippling its infrastructure in retaliation for its owners' support of the country in its war against Russian invaders.

North Korea-linked APTs use Maui Ransomware to target the Healthcare industry

Security Affairs

US authorities have issued a joint advisory warning of North Korea-linked APTs using Maui ransomware in attacks against the Healthcare sector. The FBI, CISA, and the U.S.

TCO Considerations of Using a Cloud Data Warehouse for BI and Analytics

Enterprises poured $73 billion into data management software in 2020 – but are seeing very little return on their data investments. 22% of data leaders surveyed have fully realized ROI in the past two years, with 56% having no consistent way of measuring it.

What Is a Firewall and Do you Need One?

Adam Levin

A firewall is a network security device or program designed to prevent unauthorized and malicious internet traffic from entering a private network or device.

HackerOne Employee Fired for Stealing and Selling Bug Reports for Personal Gain

Dark Reading

Company says it is making changes to its security controls to prevent malicious insiders from doing the same thing in future; reassures bug hunters their bounties are safe

IT 108

Swimlane Raises $70M to Grow Security Automation Outside US

Data Breach Today

Swimlane Wants to Expand in Europe and Asia as well as Outside the Fortune 2000 Swimlane has raised $70 million to expand its clientele beyond the Fortune 2000 and acquire more customers in Europe and Asia-Pacific.

Sales 204

OpenSSL version 3.0.5 fixes a flaw that could potentially lead to RCE

Security Affairs

The development team behind the OpenSSL project fixed a high-severity bug in the library that could potentially lead to remote code execution. The maintainers of the OpenSSL project fixed a high-severity heap memory corruption issue , tracked as CVE-2022-2274 , affecting the popular library.

12 Considerations When Evaluating Data Lake Engine Vendors for Analytics and BI

Businesses today compete on their ability to turn big data into essential business insights. Modern enterprises leverage cloud data lakes as the platform used to store data. 57% of the enterprises currently using a data lake cite improved business agility as a benefit.

Best Disaster Recovery Solutions for 2022

eSecurity Planet

Disaster recovery (DR) and business continuity have been an essential aspect of enterprise IT for decades. Whether it’s earthquakes, floods, or power outages, DR is there to ensure operations can continue. But more recently, a lot more has been put on the DR plate.

Cloud 91

Supply Chain Attack Deploys Hundreds of Malicious NPM Modules to Steal Data

Dark Reading

A widespread campaign uses more than 24 malicious NPM packages loaded with JavaScript obfuscators to steal form data from multiple sites and apps, analysts report


ISMG Editors: What's the Status of the SBOM?

Data Breach Today

Discussing the risks of bullying for anonymous social app NGL

Security Affairs

This is a transcription of my complete interview with the program NEWSFEED at TRT, during which we discussed NGL software and the risks of bullying. Why are anonymous social apps like NGL cause for concern? What exactly makes them dangerous for minors?

Risk 98

Checklist Report: Preparing for the Next-Generation Cloud Data Architecture

Data architectures have evolved dramatically. It is time to reconsider the fundamental ways that information is accumulated, managed, and then provisioned to the different downstream data consumers.

New WhatsApp Scam Uses Call Forwarding Social Engineering to Hijack Accounts


This is a great example of how even the simplest of social engineering tactics can be used as the first step in a likely-larger scam. In a recent short post on LinkedIn , Rahul Sasi, CEO of CloudSEK highlights a simple scam that goes like this: Social Engineering


Apple Debuts Spyware Protection for State-Sponsored Cyberattacks

Dark Reading

Apple's new Lockdown Mode protects devices targeted by sophisticated state-sponsored mercenary spyware attacks


Vendor's Ransomware Attack Hits Over 600 Healthcare Clients

Data Breach Today

Accounts Receivables Firm Incident Affected Patients of Many Entities A ransomware attack on an accounts receivables management firm has affected hundreds of healthcare clients - including dental practices, physician groups and hospitals, resulting in one of the largest health data breaches involving a vendor so far this year.