New AI Security Guidelines Published by NCSC, CISA & More International Agencies

The U.K.’s National Cyber Security Centre, the U.S.’s Cybersecurity and Infrastructure Security Agency and international agencies from 16 other countries have released new guidelines on the security of artificial intelligence…

Continue ReadingNew AI Security Guidelines Published by NCSC, CISA & More International Agencies

EleKtra-Leak Campaign Uses AWS Cloud Keys Found on Public GitHub Repositories to Run Cryptomining Operation

Image: WhataWin New research from Palo Alto Networks’s Unit 42 exposes an active attack campaign in which a threat actor hunts for Amazon IAM credentials in real time in GitHub…

Continue ReadingEleKtra-Leak Campaign Uses AWS Cloud Keys Found on Public GitHub Repositories to Run Cryptomining Operation

Could Australia’s Cybersecurity Strategy Benefit From More Data Science Rigour?

Australia’s Home Affairs Minister Clare O’Neil recently revealed details of Australia’s Cyber Security Strategy 2023–2030. Designed to protect Australia in a fast-moving threat environment, the strategy would rely on building…

Continue ReadingCould Australia’s Cybersecurity Strategy Benefit From More Data Science Rigour?

Microsoft Exposes Octo Tempest, One of the Most Dangerous Financial Threat Actors to Date

A new report from Microsoft Incident Response and Microsoft Threat Intelligence teams exposed the activities and constant evolution of a financially oriented threat actor named Octo Tempest, who deploys advanced…

Continue ReadingMicrosoft Exposes Octo Tempest, One of the Most Dangerous Financial Threat Actors to Date

Apple Vulnerability Can Expose iOS and macOS Passwords, Safari Browsing History

This Safari vulnerability has not been exploited in the wild. Apple offers a mitigation, but the fix needs to be enabled manually. Image: ink drop/Adobe Stock Security researchers from three…

Continue ReadingApple Vulnerability Can Expose iOS and macOS Passwords, Safari Browsing History

New Cyberattack From Winter Vivern Exploits a Zero-Day Vulnerability in Roundcube Webmail

After reading the technical details about this zero-day that targeted governmental entities and a think tank in Europe and learning about the Winter Vivern threat actor, get tips on mitigating…

Continue ReadingNew Cyberattack From Winter Vivern Exploits a Zero-Day Vulnerability in Roundcube Webmail

Five Eyes Coalition Release Guidelines for Business Leaders on Securing Intellectual Property

The Five Eyes coalition's principles focus on reducing the possibility of IP theft, particularly from nation-state-sponsored threat actors. The Five Eyes security alliance, made up of intelligence agencies from Australia,…

Continue ReadingFive Eyes Coalition Release Guidelines for Business Leaders on Securing Intellectual Property