iTnews Security Leader Benchmark Award Finalist

iTnews Security Leader Benchmark Award Finalist

https://www.itnews.com.au/news/meet-the-finalists-of-the-inaugural-itnews-benchmark-awards-security-611522 l’m honored to have been selected as a finalist for the iTnews Benchmark Awards: Security. This recognition is a testament to the incredible people I work...

White House Aims to Strengthen Internet Routing Security

https://www.whitehouse.gov/oncd/briefing-room/2024/09/03/fact-sheet-biden-harris-administration-releases-roadmap-to-enhance-internet-routing-security The White House has outlined a plan to enhance the security of the Border Gateway Protocol (BGP), the fundamental...

New Supply Chain Attack Hijacks Removed PyPI Packages

Revival Hijack – PyPI hijack technique exploited in the wild, puts 22K packages at risk A novel supply chain attack technique targeting the Python Package Index (PyPI) registry has been identified and exploited in the wild. Dubbed “Revival Hijack,”...

Cyberattack Disrupts Transport for London Services

https://tfl.gov.uk/campaign/cyber-security-incident Transport for London (TfL) has been impacted by a cyberattack, causing disruptions to staff systems and limited availability of services for passengers. The attack occurred on Sunday, prompting TfL to implement...
5 Steps for Securing Your Software Supply Chain

5 Steps for Securing Your Software Supply Chain

Most modern applications are assembled from open-source components with developers typically writing less than 15% of the code for their application. As the demand for open-source software grows, there’s also an increase in the number of available open-source...

AI-Powered Voice Cloning Scams on the Rise

https://www.sans.org/newsletters/ouch/phantom-voices-defend-against-voice-cloning-attacks A disturbing new trend has emerged in the world of scams – the use of artificial intelligence (AI) to clone voices and deceive unsuspecting victims. Margaret, a retired teacher,...

Critical Vulnerability Found in Airport Security System

https://ian.sh/tsa A significant security flaw has been discovered in FlyCASS, a web-based service used by some airlines to manage the Known Crewmember (KCM) program and the Cockpit Access Security System (CASS). The vulnerability could have potentially allowed...

FIDO Security Token YubiKey 5 Vulnerable to Cloning Attacks

https://ninjalab.io/wp-content/uploads/2024/09/20240903_eucleak.pdf A new side-channel vulnerability has been discovered in the YubiKey 5, the most widely used hardware token for two-factor authentication based on the FIDO standard. This vulnerability allows attackers...