Sat.Sep 24, 2022 - Fri.Sep 30, 2022

Assessing Growing Cyberthreats to Africa's Financial Sector

Data Breach Today

Rob Dartnall of Security Alliance Shares Insights on Current and Emerging Trends Financial services firms in Africa are becoming bigger cyber targets as they expand into new mobile payment and financial inclusion products.

GUEST ESSAY: The case for an identity-first approach ‘Zero Trust’ privileged access management

The Last Watchdog

Today’s enterprises are facing more complexities and challenges than ever before. Related: Replacing VPNs with ZTNA. Thanks to the emergence of today’s hybrid and multi-cloud environments and factors like remote work, ransomware attacks continue to permeate each industry.

Access 117

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

The Best VPNs to Protect Yourself Online

WIRED Threat Level

It won’t solve all of your privacy problems, but a virtual private network can make you a less tempting target for hackers. Gear Gear / Buying Guides Gear / How To and Advice Security Security / Security Advice

Leaking Passwords through the Spellchecker

Schneier on Security

Sometimes browser spellcheckers leak passwords : When using major web browsers like Chrome and Edge, your form data is transmitted to Google and Microsoft, respectively, should enhanced spellcheck features be enabled.

The Top 5 Business Outcomes Companies Can Achieve From Monitoring Consolidation

In this eBook, learn what the top five business outcomes are that organizations see when leveraging Datadog's end-to-end monitoring tool.

Feds: Chinese Hacking Group Undeterred by Indictment

Data Breach Today

Indictment 'Did Not Hinder APT41’s Operations,' says HHS HC3 Two federal indictments against APT41, a Chinese state-sponsored hacking group, haven't slowed down its operations, the U.S. government acknowledges in a warning telling the healthcare sector to be vigilant about the threat actor.

More Trending

Russia Planning Cyberattacks on Ukraine's Energy Grid

Dark Reading

Ukraine military intelligence says Russia is planning cyberattacks on the country's energy sector, as well as against allies including Poland and the Baltic states

This Vote Could Change the Course of Internet History

WIRED Threat Level

UN countries are preparing to pick a new head of the International Telecommunications Union. Who wins could shape the open web's future. Security Security / National Security Security / Privacy

Code42's Joe Payne on Why Source Code Theft Is So Prevalent

Data Breach Today

CEO Shares Strategies to Overcome Technical, Cultural Challenges of This Top Threat Too often when software developers change jobs, they take source code they've written with them, feeling the code belongs to them even if it belongs to an employer.

Metador, a never-before-seen APT targeted ISPs and telco for about 2 years

Security Affairs

A previously undetected hacking group, tracked as Metador, has been targeting telecommunications, internet services providers (ISPs), and universities for about two years.

Modernizing Workloads with the Cloud: How to Improve Performance & Reduce Costs

In this eBook, you’ll learn how to migrate workloads to Azure and optimize performance for your serverless and containerized applications in Azure.

Should Hacking Have a Code of Conduct?

Dark Reading

For white hats who play by the rules, here are several ethical tenets to consider


Sentence in a Catphishing Case


A convict serving twenty-five years in South Carolina for voluntary manslaughter and attempted armed robbery, Darnell Kahn, has now also been convicted in a US court on Federal sextortion charges. Social Engineering Phishing Spear Phishing

OT Security Shorted by Nuclear Weapon Oversight Agency

Data Breach Today

National Nuclear Security Administration Made 'Limited Progress,' Says GAO The U.S. federal agency responsible for the ongoing functionality of the nuclear weapons stockpile hasn't gotten its arms around how to secure operational technology, says the Government Accountability Office.

Russia prepares massive cyberattacks on the critical infrastructure of Ukraine and its allies

Security Affairs

The Ukrainian military intelligence warns that Russia is planning to escalate cyberattacks targeting Ukraine and Western allies.

Prioritizing Customer Experience Using SLIs & SLOs: A Case Study from The Telegraph

Service Level Indicators (SLIs) and Service Level Objectives (SLOs) are a key pillar of Site Reliability Engineering (SRE) and are the principal tool for eliminating needless alerts and focusing on what really matters to the business.

Cyber Threat Alliance Extends Membership to 6+ Leading Cybersecurity Companies

Dark Reading

CTA now has 36 members headquartered in 11 countries who follow cyber activities across the world, showing cybersecurity industry members realize the value in collaboration

Recent Optus Data Breach Teaches the Importance of Recognizing Social Engineering


Optus, one of Australia's largest telecommunications companies, recently suffered a data breach that affected over 9.8 million customers. Social Engineering Data Breach

LockBit Publishes Stolen Data as Hospital Rejects Extortion

Data Breach Today

French Government Vows Resistance, Stepped-Up Cybersecurity Funding Ransomware hackers made good on a threat to publish patient and staff data stolen from a French hospital after administrators said they refused on principal to pay out.

OpIran: Anonymous declares war on Teheran amid Mahsa Amini’s death

Security Affairs

OpIran: Anonymous launched Operation Iran against Teheran due to the ongoing crackdown on dissent after Mahsa Amini’s death. Anonymous launched OpIran against Iran due to the ongoing crackdown on dissent after Mahsa Amini’s death.

Detect and Respond to Threats Across Your Applications, Networks, and Infrastructure

Understand how to solve cloud complexity challenges with threat detection tools, analyze security threats anywhere in your stack, and deploy turnkey detection rules mapped to the MITRE ATT&CK framework with Datadog Security Monitoring.

We're Thinking About SaaS the Wrong Way

Dark Reading

Many enterprise applications are built outside of IT, but we still treat the platforms they're built with as point solutions

IT 60

Tracking engineering documents in capital projects

OpenText Information Management

In my last blog in this series on Engineering Document Management for capital projects I discussed the importance of a project workspace in achieving project success.

Child Predators Mine Twitch to Prey on Kids

WIRED Threat Level

Plus: A leaked trove illuminates Russia’s internet regulator, a report finds Facebook and Instagram violated Palestinian rights, and more. Security Security / Security News

Attackers impersonate CircleCI platform to compromise GitHub accounts

Security Affairs

Threat actors target GitHub users to steal credentials and two-factor authentication (2FA) codes by impersonating the CircleCI DevOps platform.

Optimize the Performance of Your Serverless Functions

Run mission-critical applications on serverless without sacrificing visibility.

Despite Recession Jitters, M&A Dominates a Robust Cybersecurity Market

Dark Reading

Funding has been somewhat lower than last year, but investment remains healthy, analysts say, amid thirst for cloud security in particular

Cloud 60

 Transitioning to a sustainable energy future

OpenText Information Management

Around the world, energy costs are spiking to record-high prices and aren’t expected to subside anytime soon. In fact, according to the World Bank, the price of energy commodities is expected to be 46 percent higher on average in 2023.

You Need Aggressive Cyber Training, Not "So, So" Training


According to nearly every study conducted over the last decade, social engineering is involved in the vast majority of cyber attacks. The figures range from about 30% to 90% of all hacking and malware attacks.

Exmatter exfiltration tool used to implement new extortion tactics

Security Affairs

Ransomware operators switch to new extortion tactics by using the Exmatter malware and adding new data corruption functionality. The data extortion landscape is constantly evolving and threat actors are devising new extortion techniques, this is the case of threat actors using the Exmatter malware.

The 5 Stages of Account-Based Marketing — and How to Win Them All

Successfully complete the five stages of ABM: define, identify, engage, convert, and connect. We’ll show you how to create a unified system with your sales team to help them land more qualified opportunities and connect with prospects like never before.

How Quantum Physics Leads to Decrypting Common Algorithms

Dark Reading

YouTuber minutephysics explains how Shor's algorithm builds on existing formulae like Euclid's algorithm and Fourier transforms to leverage quantum superpositioning and break encryption

What CEOs really need from today’s CIOs via

IG Guru

In the data economy, corporations need CIOs who can get out of delivery and into redesigning their businesses for the future. Business IG News CEO CIO Data Economy Information Economics


Creating a holistic 360-degree “citizen” view with data and AI

IBM Big Data Hub

Achieving health equity is perhaps the greatest challenge facing US public health officials today. In a 2021 report released by the Commonwealth Fund, the nation ranked last among high-income countries in access to healthcare and equity, despite spending a far greater share of its GDP on healthcare.