Connected contraptions cause conniption for 2024
From “spying” air fryers to 3 million rogue toothbrushes, here are the strangest stories about internet-connected home goods in 2024.
Read moreFrom “spying” air fryers to 3 million rogue toothbrushes, here are the strangest stories about internet-connected home goods in 2024.
Read moreAn overview of what the year 2024 had to offer in the realm of data breaches: Big ones, sensitive data and some duds
Read moreCredit to Author: Lily Hay Newman| Date: Tue, 31 Dec 2024 03:29:57 +0000
Treasury says hackers accessed “certain unclassified documents” in a “major” breach, but experts believe the attack’s impacts could prove to be more significant as new details emerge.
Read moreCredit to Author: BrianKrebs| Date: Tue, 31 Dec 2024 04:05:51 +0000
Federal authorities have arrested and indicted a 20-year-old U.S. Army soldier on suspicion of being Kiberphant0m, a cybercriminal who has been selling and leaking sensitive customer call records stolen earlier this year from AT&T and Verizon. As first reported by KrebsOnSecurity last month, the accused is a communications specialist who was recently stationed in South Korea.
Read moreThis week on the Lock and Code podcast, we speak with Anna Brading and Mark Stockley about whether anywhere is safe from AI slop.
Read moreCredit to Author: Matt Wixey| Date: Mon, 30 Dec 2024 15:05:30 +0000
In the second of a two-part series on tools and frameworks designed to help with remediation prioritization, we explore some alternatives to CVSS
Read moreCredit to Author: WIRED Staff| Date: Mon, 30 Dec 2024 11:30:00 +0000
From Elon Musk and Donald Trump to state-sponsored hackers and crypto scammers, this was the year the online agents of chaos gained ground.
Read moreCredit to Author: Steve Faehl| Date: Thu, 19 Dec 2024 17:00:00 +0000
New Microsoft guidance is now available for United States government agencies and their industry partners to help implement Zero Trust strategies and meet CISA Zero Trust requirements.
The post New Microsoft guidance for the CISA Zero Trust Maturity Model appeared first on Microsoft Security Blog.
Read moreCredit to Author: BrianKrebs| Date: Sun, 29 Dec 2024 23:48:44 +0000
KrebsOnSecurity.com turns 15 years old today! Maybe it’s indelicate to celebrate the birthday of a cybercrime blog that mostly publishes bad news, but happily many of 2024’s most engrossing security stories were about bad things happening to bad guys. It’s also an occasion to note that despite my publishing fewer stories than ever this past year, we somehow managed to attract near record levels of readership (thank you!).
Read moreCredit to Author: Matt Wixey| Date: Fri, 27 Dec 2024 17:33:53 +0000
In the first of a two-part series exploring tools and frameworks which can help organizations with remediation prioritization, Sophos X-Ops takes a look at the Common Vulnerability Scoring System (CVSS)
Read more