lugapelsiteadmin
Tips on meeting complex cloud security challenges
Learn about the benefits of applying advanced automation to policy management practices Webinar Dealing with the double trouble of relentless cyber threats and regular technology refresh cycles can stretch already overworked security practitioners. And orchestrating the transition to cloud-native applications and multi-cloud architectures doesn't make things any easier.…
X protests forced suspension of accounts on orders of India’s government
Nonprofit SFLC links orders to farming protests The global government affairs team at X (née Twitter) has suspended some accounts and posts in India after receiving executive orders to do so from the country's government, backed by threat of penalties including significant fines and imprisonment.…
Avast shells out $17M to shoo away claims it peddled people’s personal data
A name that's commonly shouted by pirates might be a clue, me hearties! Avast has agreed to cough up $16.5 million after the FTC accused the antivirus vendor of selling customer information to third parties.…
Cyberattack downs pharmacies across America
Prescription orders hit after IT supplier Change Healthcare pulls plug on systems Updated IT provider Change Healthcare has confirmed it shut down some of its systems following a cyberattack, disrupting prescription orders and other services at pharmacies across the US.…
Authorities dismantled LockBit before it could unleash revamped variant
New features aimed to stamp out problems of the past Law enforcement's disruption of the LockBit ransomware crew comes as the criminal group was working on bringing a brand-new variant to market, research reveals.…
Ukrainian police arrest father and son in suspected LockBit affiliate double act
If they did it, it gives new meaning to quality family time. Meanwhile, key LockBit leaders remain at large Today's edition of the week-long LockBit leaks reveals a father-son duo was apprehended in Ukraine as part of the series of takedown-related arrests this week.…
Giant leak reveals Chinese infosec vendor I-Soon is one of Beijing’s cyber-attackers for hire
Trove reveals RATs that can pop major OSes, campaigns against offshore and local targets A cache of stolen document posted to GitHub appears to reveal how a Chinese infosec vendor named I-Soon offers rent-a-hacker services for Beijing.…
Duo face 20 years in prison over counterfeit iPhone scam
Sent 5,000+ fake handsets to Apple for repair in hope of getting real ones back Two Chinese nationals are facing a maximum of 20 years in prison after being convicted of mailing thousands of fake iPhones to Apple for repair in the hope they'd be replaced with new…
Biden asks Coast Guard to create an infosec port in a stormy sea of cyber threats
Oh hear us when we cry to thee for those in peril on the sea President Biden has empowered the US Coast Guard (USCG) to get a tighter grip on cybersecurity at American ports – including authorizing yet another incident reporting rule.…
Apple promises to protect iMessage chats from quantum computers
Easy to defend against stuff that may never actually work – oh there we go again, being all cynical like Apple says it's going to upgrade the cryptographic protocol used by iMessage to hopefully prevent the decryption of conversations by quantum computers, should those machines ever exist in…