Categories
-
Recent Posts
- Microsoft Open-Sources ‘CyberBattleSim’ Enterprise Environment Simulator
- CISA Releases Tool to Detect Microsoft 365 Compromise
- LG Promises Three Years of OS Updates for Premium Android Smartphones
- Pwn2Own 2021 Participants Earn Over $1.2 Million for Their Exploits
- Collaboration Platforms Increasingly Abused for Malware Distribution, Data Exfiltration
Tag Cloud
- Apple
- arshnet
- Aurora Vulnerability
- Authentication
- Bill
- CERT
- Computer Security
- Conficker
- Conficker.C Domain Collisions
- critical security vulnerability
- CSIS
- cyber-compartmented
- Cyber Assault
- Cyber Attack
- cyber attacks
- cyberattacks
- Cyber Crime
- Cybercrime
- cybercriminals
- Cyberczar
- cyber infrastructure
- CyberJobShop
- Cybersecurity
- Cyber Security
- Cyber Security Czar
- cyber security professionals
- Cybersecurity review
- cybersecurity strategy
- cyberspace
- Cyber Terrorism
- electronic attack
- Forensics Tools
- G:7-Security
- hackers
- Homeland Security
- Honeynet Project
- https
- Information Security
- Information Warfare
- Infosecurity Europe
- Internet Security
- Internet switch
- Intrusion Detection Signatures
- isecurity
- IT security
- Jay Rockefeller
- keychain
- Memory Disinfector
- national cybersecurity
- National Cybersecurity Advisor
- Network Security
- NIST compliance
- Pentagon
- Risk Management Strategies
- S773
- S778
- Secure DNS
- Secure Webmail
- Security
- Security Auditing and Logging
- Security Breach
- security experts
- security news
- security policies
- security standards
- Security Threat
- security threats
- Security Toolkit
- software vulnerabilities
- U.S. Senate
- US-CERT
- US Cyber System
- vulnerabilities
- White House
Pages
@iSecurity
Top Posts
- TryHackMe — RaceTrack Bank Walkthrough
- Microsoft Open-Sources 'CyberBattleSim' Enterprise Environment Simulator
- Microsoft: Ongoing, Expanding Campaign Bypassing Phishing Protections
- Vulnerability in 'Domain Time II' Could Lead to Server, Network Compromise
- Belden Says Health-Related Information Exposed in Data Breach
- Library Dependencies and the Open Source Supply Chain Nightmare
- Collaboration Platforms Increasingly Abused for Malware Distribution, Data Exfiltration
- CISA Releases Tool to Detect Microsoft 365 Compromise
Author Archives: iSecurity
Microsoft Open-Sources ‘CyberBattleSim’ Enterprise Environment Simulator
Microsoft this week announced the open source availability of Python code for “CyberBattleSim,” a research toolkit that supports simulating complex computer systems. read morehttp://dlvr.it/RxLFGj
Posted in Uncategorized
Leave a comment
CISA Releases Tool to Detect Microsoft 365 Compromise
The U.S. Department of Homeland Security’s Cybersecurity and Infrastructure Security Agency (CISA) has released a new tool to help with the detection of potential compromise within Microsoft Azure and Microsoft 365 environments. read morehttp://dlvr.it/RxL0BC
Posted in Uncategorized
Leave a comment
LG Promises Three Years of OS Updates for Premium Android Smartphones
South Korean tech giant LG this week announced that it will continue to provide operating system updates to users of its premium Android smartphones, for up to three years. read morehttp://dlvr.it/RxJzrJ
Posted in Uncategorized
Leave a comment
Pwn2Own 2021 Participants Earn Over $1.2 Million for Their Exploits
The Pwn2Own 2021 hacking competition has come to an end, with participants earning more than $1.2 million — more than ever paid out at the event — for exploits in the browser, virtualization, server, local privilege escalation, and enterprise communications … Continue reading
Posted in Uncategorized
Leave a comment
Collaboration Platforms Increasingly Abused for Malware Distribution, Data Exfiltration
Threat actors are increasingly abusing collaboration platforms for nefarious purposes, including malware delivery and data exfiltration, security researchers with Cisco’s Talos division report. read morehttp://dlvr.it/RxJMkG
Posted in Uncategorized
Leave a comment
Library Dependencies and the Open Source Supply Chain Nightmare
It’s a bigger problem than is immediately apparent, and has the potential for hacks as big as Equifax and as widespread as SolarWinds. read morehttp://dlvr.it/RxFvG2
Posted in Uncategorized
Leave a comment
Belden Says Health-Related Information Exposed in Data Breach
Specialty networking solutions provider Belden on Wednesday shared an update on the data breach disclosed in November 2020, and said health-related information was also exposed. read morehttp://dlvr.it/RxFkDG
Posted in Uncategorized
Leave a comment
Vulnerability in ‘Domain Time II’ Could Lead to Server, Network Compromise
A vulnerability residing in the “Domain Time II” network time solution can be exploited in Man-on-the-Side (MotS) attacks, cyber-security firm GRIMM warned on Tuesday. read morehttp://dlvr.it/RxF2fF
Posted in Uncategorized
Leave a comment
User database was also hacked in the recent hack of PHP ‘s Git Server
The maintainers of the PHP programming language confirmed that threat actors may have compromised a user database containing their passwords. The maintainers of the PHP programming language have provided an update regarding the security breach that took place on March … Continue reading
Posted in Uncategorized
Leave a comment
Hackers Selling 330,000 Stolen Payment Cards and 895,000 Gift Cards from Online Shops
What do the likes of AirBnB, Amazon, American Airlines, Chipotle, Dunkin Donuts, Nike, Marriott, Target, Subway and Walmart, have in common? Well, a database of the gift cards of these companies along with several other was hacked and sold online. … Continue reading
Posted in Uncategorized
Leave a comment