NASA Focuses on Cybersecurity of its Mission-Critical Software

The software verification and validation efforts helps NASA improve the safety and cost-effectiveness of its mission critical software. Cybersecurity is now part of the evaluation.

darkreading – ​Read More

‘Store Now, Decrypt Later’: US Leaders Prep for Quantum Cryptography Concerns

U.S. cybersecurity leaders are focusing on preparing for the potential risks posed by quantum cryptography tools that could threaten critical infrastructure and national security.

Cyware News – Latest Cyber News – ​Read More

Employee Arrested for Locking Windows Admins Out of 254 Servers in Extortion Plot

The FBI investigation revealed that the suspect, Daniel Rhyne, had accessed the company’s systems without authorization and changed passwords for various accounts. Rhyne’s actions were intended to deny the company access to its systems and data.

Cyware News – Latest Cyber News – ​Read More

Third-Party Risk Management is Under the Spotlight

Third-party risk management is a critical issue in the wake of the CrowdStrike IT outage, revealing vulnerabilities within financial institutions related to supply chain resilience, especially in vital sectors like financial services.

Cyware News – Latest Cyber News – ​Read More

Why Identity Teams Need to Start Reporting to the CISO

Identity management sits with IT for good reason, but now that identity is the common denominator in every attack, it’s time identity security was owned by a leader with a security background, like the CISO.

darkreading – ​Read More

UK Labour Party Reprimanded Over Cyberattack Backlog by Privacy Regulator

More than 150 people filed complaints to the Information Commissioner’s Office (ICO) regarding the delay in responding to subject access requests (SARs) after the cyberattack in October 2021.

Cyware News – Latest Cyber News – ​Read More

Russian APT29 Using NSO Group-Style Exploits in Attacks, Google

Google’s Threat Analysis Group (TAG) has exposed a new campaign by Russian state-backed APT29, also known as Cozy…

Hackread – Latest Cybersecurity, Tech, Crypto & Hacking News – ​Read More

Cyberattackers Exploit Google Sheets for Malware Control in Global Espionage Campaign

Cybersecurity researchers have uncovered a novel malware campaign that leverages Google Sheets as a command-and-control (C2) mechanism.
The activity, detected by Proofpoint starting August 5, 2024, impersonates tax authorities from governments in Europe, Asia, and the U.S., with the goal of targeting over 70 organizations worldwide by means of a bespoke tool called Voldemort that’s equipped to

The Hacker News – ​Read More

Report: Ransomware Attacks on US Schools and Colleges Cost $9.45 Billion

Over the last few years, ransomware attacks have become a major concern for schools and colleges in the US, with an average of $500,000 being lost per day due to downtime from these attacks, according to Comparitech.

Cyware News – Latest Cyber News – ​Read More

The NIS2 Directive: How Far Does it Reach?

Key aspects of the NIS2 Directive include a focus on proactive cybersecurity measures for entities within its scope, such as risk analysis, incident handling, and supply chain security.

Cyware News – Latest Cyber News – ​Read More