Top news of the week: 06.07.2022.
How mercenary hackers sway litigation battles
A trove of thousands of emails uncovered by Reuters reveals Indian cyber mercenaries hacking parties involved in lawsuits around the world – showing how hired spies have become the secret ...
Revisions to TSA pipeline cyber rules highlight delicate balance between fed goals, industry realities
Strict new cybersecurity regulations for pipeline owners and operators issued after the Colonial Pipeline ransomware attack will transition to a performance-based model that will enhance ...
How can you find and retain new cybersecurity talent?
In the latest (ISC)² Think Tank webinar “How to Hire and Develop Entry- and Junior-Level Cybersecurity Practitioners” three hiring managers tackled the question of how to fill the workforce ...
Cybersecurity Best Practices During War in Ukraine
Marianne Bailey of Guidehouse brings her experience in government to bear on the private sector. In this interview, she offers insight on Ukraine and security best practices.
SECURE Webinars
Upcoming Webinars Monday 11 July 2022 | Supply Chain Security: Planes, Trains, Trucks and Ships 1:00 p.m. BST I Earn 1.5 CPE Credits Register Now Our supply chains are currently …
Wegmans’ cloud misconfiguration leads to $400,000 fine for exposed customer data
The breach was identified by an unnamed third-party security researcher in April 2021, who reported that the personal data of more than 3 million Wegmans customers nationwide was exposed.
Critical ManageEngine ADAudit Plus Vulnerability Allows Network Takeover, Mass Data Exfiltration
An unauthenticated remote code execution vulnerability found in Zoho’s compliance tool could leave organizations exposed to an information disclosure catastrophe, new analysis shows.
XNL-h4ck3r
More China Targeting Rare-Earth Companies with Influence Operations Mandiant has found evidence of Chinese attackers running influence operations against companies competing with …