Monthly Archives: November 2024
Five ways to manage NHIs
COMMENTARY: In a world where machines are becoming increasingly autonomous and interconnected, managing machine identities has become m...
FCC launches first review of submarine cable rules since 2001
News
The Federal Communications Commission has voted to launch a major review of licensing rules surrounding submarine cable rules.
A n...
Google’s AI-powered fuzzing tool discovers 26 new vulnerabilities
Google’s OSS-Fuzz tool, now enhanced with AI capabilities, has discovered 26 new vulnerabilities in open-source projects, including a l...
North Korean IT worker scam linked to Chinese front companies
The North Korean fraudulent IT worker scheme took on a new twist when it was reported Nov. 21 that four companies disrupted by the U.S....
Joint US, Australian advisory sheds more light on BianLian ransomware
Highly active BianLian ransomware operation, which has claimed attacks against Boston Children's Health Physicians, Save The Children, ...
US charges suspected Scattered Spider hackers, disrupts PopeyeTools
The U.S. has been continuing its crackdown against malicious cyber actors, with separate Justice Department actions against suspected m...
Telcos subjected to Chinese cyberespionage intrusions
Intrusions by Liminal Panda, which had some components resembling those leveraged in LightBasin attacks, involved the utilization of th...
Novel NFC-exploiting Ghost Tap attack technique gains traction
Attacks involving Ghost Tap commence with the compromise of payment card data and one-time passwords for virtual wallets, which are the...
Most prevalent, menacing software vulnerabilities ranked by MITRE
MITRE has regarded cross-site scripting flaws as the most common and severe software vulnerabilities this year, followed by out-of-boun...
The path to innovation: 3 stories of resilience from women in cybersecurity
(Editor's Note: This article is one in a series of articles, part of SC Media's 2024 Women in IT Security honoree program.)Innovation i...