SecurityWeek: Cybersecurity News, Insights, Analysis

Hundreds infected with "Wasp" stealer in ongoing supply chain attacks.

Views expressed in this cybersecurity, cybercrime update are those of the reporters and correspondents.  Accessed on 17 November 2022, 1337 UTC.

Content provided by "SecurityWeek.com."

Source:  https://www.securityweek.com/

Please click link or scroll down to read your selections.  Thanks for joining us today.

Russ Roberts (https://www.hawaiicybesecurityjournal.net and https://paper.li/RussellRoberts).

MORE SECURITY HEADLINES

Mozilla has released Firefox 107 and the latest version of the web browser patches 19 vulnerabilities, including many with a high impact rating. [Read More]
Investors pour $65 million into an early-stage Israeli startup building technology to help businesses manage secrets like credentials, certificates and keys. [Read More]
Join us in the 3D virtual platform to learn about innovative strategies and tools that security teams can use to detect, contain, and eliminate threats in enterprise networks. [Read More]
The effect of reduced staffing levels over holidays and weekends doesn’t just attract more cybercriminals, it makes the outcome of attacks more severe. [Read More]
Application security startup ArmorCode raises $14 million in Series A funding round led by Ballistic Ventures. [Read More]
New GAO report analyzes DoD’s cyber incident management capabilities and provides recommendations on addressing identified weaknesses. [Read More]
BoostSecurity has emerged from stealth mode with a DevSecOps automation platform and $12 million in seed funding. [Read More]
A new EU law imposing stricter online regulation comes into effect Wednesday and the biggest platforms like Facebook and Google will have until February 17 to reveal their user numbers. [Read More]
Google is getting ready for the rollout of Android Privacy Sandbox, a new feature meant to provide more private advertising on mobile devices. [Read More]
A team of researchers has shown how a networking technology vulnerability could be exploited to hack spacecraft and other critical systems. [Read More]

SECURITYWEEK EXPERTS

rss icon

Torsten George's picture
When implemented properly, cyber resilience can be considered a preventive measure to counteract human error, malicious actions, and decayed, insecure software.
Galina Antova's picture
Understanding the vulnerability landscape of the XIoT to properly assess and mitigate risk is critically important to protect livelihoods and lives.
Marc Solomon's picture
When we start to consider the human element of the security automation equation, and its impact on the automation capabilities we select and how we measure progress, we can accelerate automation initiatives and the benefits we derive.
Joshua Goldfarb's picture
If security can learn to communicate in a way that executives and boar members can understand, internalize, and act upon, it serves to benefit tremendously.
Derek Manky's picture
Organizations may better align their defenses to adapt and react proactively to rapidly changing attack approaches when they have a better grasp of the objectives and strategies employed by their adversaries.
Jeff Orloff's picture
By focusing on attack tactics and techniques that pose clear and present danger to the business, a company can achieve the greatest return on its training initiatives.
Gordon Lawson's picture
The new SEC requirements are putting on paper what many companies—public and private—should have been investing in already.
Landon Winkelvoss's picture
How organizations can use managed services to optimize their threat intelligence program during an economic downturn.
Torsten George's picture
Here are five best practices for defeating against most attacks, hopefully making the need for future Cybersecurity Awareness Months obsolete.
Marc Solomon's picture
Within the context of security operations, anticipation teams use internal and external threat and event data across their security infrastructure for context and analytics and to become more proactive.

Comments

Popular posts from this blog

The Cyberwire Daily Briefing

BleepingComputer.com

SecurityWeek Briefing