Security News

How can the energy sector bolster its resilience to ransomware attacks?
2024-04-08 05:00

According to one report on OT/ICS cyber security incidents, the energy sector recorded 39% of all attacks, with nearly 60% of these attacks attributed to state-affiliated groups. As well as the threat of politically motivated attacks aimed at gaining a strategic advantage, threat actors are also attracted to the potential financial gains from accessing vast stores of sensitive Information.

WiCyS: A champion for a more diverse cybersecurity workforce
2024-04-08 04:30

WiCyS is an organization dedicated to advancing the representation and success of women in cybersecurity, as well as fostering a more diverse workforce through various strategic initiatives. We work closely with academic institutions, governmental agencies, and industry partners to not only help women enter cybersecurity but to stay, succeed and lead. Our flagship event, the WiCyS Conference, brings together women and allies offering attendees - both in-person and virtual - technical presentations, workshops, panels, lightning talks, networking socials, résumé reviews, mock interviews, professional headshots, a career fair, a capture-the-flag competition, and more.

How malicious email campaigns continue to slip through the cracks
2024-04-08 04:00

In this Help Net Security video, Josh Bartolomie, VP of Global Threat Services at Cofense, discusses how email will remain a target as long as it remains the predominant form of communication within a business. Cofense researchers have found that malicious email threats bypassing secure email gateways increased over 100% in the past year.

Industrial sectors embrace zero trust for enhanced security
2024-04-08 03:30

Organizations are leveraging zero trust to enhance the safety, security, and reliability of their enterprise across IT and OT environments, according to Xage Security. Zero trust security implementation in industrial sectors.

Threat actors are raising the bar for cyber attacks
2024-04-08 03:00

From sophisticated nation-state-sponsored intrusions to opportunistic malware campaigns, cyber attacks manifest in various forms, targeting vulnerabilities in networks, applications, and user behavior. The consequences of successful cyber attacks can be severe, ranging from financial losses and reputational damage to potential legal ramifications.

The new features coming in Windows 11 24H2, expected this fall
2024-04-07 21:36

Windows 11 24H2 is set to arrive on existing devices this fall with several new features, mostly Copilot-related improvements. Copilot goes big in Windows 11 24H2. Copilot is finally becoming useful in version 24H2 with features like the ability to control settings directly through the AI window.

Home Depot confirms third-party data breach exposed employee info
2024-04-07 17:40

Home Depot has confirmed that it suffered a data breach after one of its SaaS vendors mistakenly exposed a small sample of limited employee data, which could potentially be used in targeted phishing attacks.On Thursday, a threat actor known as IntelBroker leaked limited data for approximately 10,000 Home Depot employees on a hacking forum.

New Windows driver blocks software from changing default web browser
2024-04-07 14:17

Microsoft is now using a Windows driver to prevent users from changing the Windows 10 and Windows 11 default browser manually or through software. SetDefaultBrowser works similarly but is only for changing the default browser in Windows.

Week in review: 73M customers affected by AT&T data leak, errors led to US govt inboxes compromise
2024-04-07 08:00

How Google plans to make stolen session cookies worthless for attackersGoogle is working on a new security feature for Chrome called Device Bound Session Credentials, meant to prevent attackers from using stolen session cookies to gain access user accounts. A "Cascade" of errors let Chinese hackers into US government inboxesMicrosoft still doesn't known how Storm-0558 attackers managed to steal the Microsoft Services Account cryptographic key they used to forge authentication tokens needed to access email accounts belonging to US government officials.

What can be done to protect open source devs from next xz backdoor drama?
2024-04-06 16:12

Your profile can be used to present content that appears more relevant based on your possible interests, such as by adapting the order in which content is shown to you, so that it is even easier for you to find content that matches your interests. Content presented to you on this service can be based on your content personalisation profiles, which can reflect your activity on this or other services, possible interests and personal aspects.