North Korean Hacker Poses as IT Worker in Attempted Cyberattack

https://blog.knowbe4.com/how-a-north-korean-fake-it-worker-tried-to-infiltrate-us A security firm, KnowBe4, has foiled an attempt by a North Korean hacker to infiltrate its systems by posing as a legitimate software engineer. The company successfully identified and...

Google U-Turns on Third-Party Cookie Phaseout

https://privacysandbox.com/news/privacy-sandbox-update In a major policy reversal, Google has abandoned its plans to phase out third-party tracking cookies in its Chrome web browser. The tech giant, which has faced intense scrutiny and regulatory pressure over its...

20 Million Domains at Risk from New Email Spoofing Attacks

https://www.darkreading.com/threat-intelligence/20-million-trusted-domains-vulnerable-to-email-hosting-exploits Cybersecurity researchers have uncovered a critical vulnerability affecting over 20 million trusted domains, including those belonging to Fortune 500...
Our Assumed Trust in Cyber Security Vendors

Our Assumed Trust in Cyber Security Vendors

Imagine you are a security manager being asked to do a security assessment on a new software for your organisation. It will be deployed across all Windows workstations and servers and will operate as a boot start driver in kernel mode, granting it extensive access to...