French cyberwarriors ready to fight hackers, malware during Olympics – ET CISO https://etimg.etb2bimg.com/thumb/msid-109832804,imgsize-138134,width-1200,height=765,overlay-etciso/ot-security/french-cyberwarriors-ready-to-fight-hackers-malware-during-olympics.jpg Just like the Olympic athletes, the cyberwarriors that will be crucial for the success of the Paris Games are deep into training for the big event. They have turned to friendly hackers to probe their cyberdefenses, like boxers who use sparring partners to ready them for a ...
Read More »Author Archives: firewallfirmadmin
‘Hackers potentially stole a third of Americans’ data’, ET CISO
‘Hackers potentially stole a third of Americans’ data’, ET CISO Hackers who breached UnitedHealth’s tech unit in February potentially stole a third of Americans’ data, the largest U.S. health insurer’s CEO told a Congressional committee on Wednesday. Two Congressional panels grilled CEO Andrew Witty about the cyberattack on the company’s Change Healthcare unit, which processes around 50 per cent of ...
Read More »A checklist for strengthening your cloud security posture – ET CISO
A checklist for strengthening your cloud security posture – ET CISO https://etimg.etb2bimg.com/thumb/msid-81404212,imgsize-226474,width-1200,height=765,overlay-etciso/news/a-checklist-for-strengthening-your-cloud-security-posture.jpg By Ravi MaguluriAccording to IDC’s IT spending Survey, May 2020, as a result of the spread of the pandemic, 64% of the organizations in India are expected to increase demand for cloud computing while 56% for cloud software to support the new normal. Cost savings, scalability, and flexibility ...
Read More »NSA, FBI Alert on N. Korean Hackers Spoofing Emails from Trusted Sources
NSA, FBI Alert on N. Korean Hackers Spoofing Emails from Trusted Sources https://firewall.firm.in/wp-content/uploads/2024/05/rmails.png May 03, 2024NewsroomEmail Security / Malware The U.S. government on Thursday published a new cybersecurity advisory warning of North Korean threat actors’ attempts to send emails in a manner that makes them appear like they are from legitimate and trusted parties. The joint bulletin was published by ...
Read More »Microsoft has warning about these 2 Android apps – ET CISO
Microsoft has warning about these 2 Android apps – ET CISO https://etimg.etb2bimg.com/thumb/msid-109832906,imgsize-62402,width-1200,height=765,overlay-etciso/ot-security/microsoft-has-warning-about-these-2-android-apps.jpg Microsoft researchers recently discovered vulnerabilities in several popular Android applications, totaling over 4 billion downloads according to a blog post by Microsoft’s Threat Intelligence Team. These security flaws could have allowed attackers to steal sensitive user data. The specific issue identified is called a “dirty stream” attack, where ...
Read More »Wells Fargo fires employee after data breach exposes customer information, ET CISO
Wells Fargo fires employee after data breach exposes customer information, ET CISO Wells Fargo has disclosed a data breach caused by the actions of one of its employees, resulting in the exposure of personal and mortgage account information for two of its customers. The incident, confirmed by the California-based banking giant, was not a cyber-attack but rather a violation of ...
Read More »FLoC and data privacy in the world of targeted ads – ET CISO
FLoC and data privacy in the world of targeted ads – ET CISO https://etimg.etb2bimg.com/thumb/msid-82208111,imgsize-379570,width-1200,height=765,overlay-etciso/news/floc-and-data-privacy-in-the-world-of-targeted-ads.jpg By Anupam shuklaA 70s adage about television advertising goes something like “if you are not paying for the product, then you ARE the product!”. Pithy as the quote may be, it contains a world of meaning and relevance, especially for today. We cannot deny that today ...
Read More »Hackers Increasingly Abusing Microsoft Graph API for Stealthy Malware Communications
Hackers Increasingly Abusing Microsoft Graph API for Stealthy Malware Communications https://firewall.firm.in/wp-content/uploads/2024/05/malware.png May 03, 2024NewsroomCloud Security / Threat Intelligence Threat actors have been increasingly weaponizing Microsoft Graph API for malicious purposes with the aim of evading detection. This is done to “facilitate communications with command-and-control (C&C) infrastructure hosted on Microsoft cloud services,” the Symantec Threat Hunter Team, part of Broadcom, said ...
Read More »Facebook, Instagram in EU crosshairs for suspected tech rule breaches – ET CISO
Facebook, Instagram in EU crosshairs for suspected tech rule breaches – ET CISO https://etimg.etb2bimg.com/thumb/msid-109773610,imgsize-48770,width-1200,height=765,overlay-etciso/corporate/facebook-instagram-in-eu-crosshairs-for-suspected-tech-rule-breaches.jpg File image Meta Platforms’ Facebook and Instagram have failed to tackle deceptive advertising and disinformation ahead of key European Parliament elections, the European Commission said on Tuesday as it opened an investigation into suspected breaches of EU online content rules. The move by EU tech regulators ...
Read More »What is the CISO’s first recourse?, IT Security News, ET CISO
What is the CISO’s first recourse?, IT Security News, ET CISO What happens in the case of the inevitable – a cyberattack? What is the first recourse? This came up when a leading advocate who is also a leading cybersecurity counsel to organizations and works with the Government too – broached this thought during a conference. He observed that most ...
Read More »