News

Latest breaking cybersecurity news

iTrust: A Tool for Today’s Cybersecurity Challenges

iTrust: A Tool for Today’s Cybersecurity Challenges

Blog  Organizations worldwide are grappling with safeguarding their digital assets against escalating threats. These threats encompass traditional cyber-attacks and include more insidious risks that lurk within the vast amounts of data organizations generate...

read more
Cyber Security Posture in 2024: All You Need to Know

Cyber Security Posture in 2024: All You Need to Know

Blog  Cyber security posture refers to an organization's overall defensive stance against cyber threats, encompassing its policies, practices, and technologies designed to protect digital assets and sensitive information from unauthorized access, theft, or...

read more
TrustNet’s Takeaways from CyberDefenseCon 2023

TrustNet’s Takeaways from CyberDefenseCon 2023

Giving their take on CyberDefenseCon’s 2023 agenda, TrustNet brings forward their expertise in detecting cyber threats and ensuring rapid response before events escalate. They explore how these capabilities play a crucial role in defending against cyberattacks and maintaining business continuity.

read more
AICPA Updates SOC 2 Guidance: What’s Changed?

AICPA Updates SOC 2 Guidance: What’s Changed?

  The AICPA has revised and updated the SOC 2 guidelines. There are no changes to the SOC 2 trust services criteria (commonly referred to as control objectives) however, there are new and revised “points of focus.” At the core, the points of focus provide...

read more
Trends and Predictions for Cybersecurity 2023

Trends and Predictions for Cybersecurity 2023

The field of cybersecurity is constantly evolving due to the rapid advancements in technology and the constantly changing threat of cybercrime. To stay informed and be prepared for the future, it is important to understand what experts predict for cybersecurity in...

read more
ChatGPT: Cybersecurity Threat or Not Really?

ChatGPT: Cybersecurity Threat or Not Really?

Artificial intelligence (AI) has become commonplace in many aspects of our lives in recent years. We have seen AI used to automate customer service helplines, improve the accuracy of facial recognition software, and even power...

read more
Biden Administration to Release National Cyber Strategy

Biden Administration to Release National Cyber Strategy

The Biden Administration is set to release a comprehensive National Cyber Strategy that will work to strengthen the security of our nation's digital infrastructure and protect us from malicious cyber threats. This strategy comes when cybersecurity is more important...

read more
Holiday Breaches and Scams 2022-2023

Holiday Breaches and Scams 2022-2023

For most Americans, the holidays are full of shopping, festive candlelight dinners, and family gatherings. However, for some consumers, one number on their credit card statement stands out among all those other numbers—the dollar amount from unauthorized charges made...

read more
Notice of Recent Security Incident: LastPass

Notice of Recent Security Incident: LastPass

A security breach has been discovered within the LastPass password manager service. More information to come in the coming weeks. Keep your LastPass account safe by changing your master password and creating a new unique one-time recovery key. The LastPass team is...

read more
Windows Mark of the Web Zero-Days Remain Patchless

Windows Mark of the Web Zero-Days Remain Patchless

Microsoft's Mark of the Web (MOTW) is a security feature that prevents malicious files and attachments from being downloaded or opened. However, two independent vulnerabilities exist in various versions of Windows that allow attackers to bypass this protection. Will...

read more
Are You Ready for the New ISO 27001:2022?

Are You Ready for the New ISO 27001:2022?

This year has seen the first significant update to ISO 27002 since 2013. These modifications reflect in Annex A's security controls for organizations with ISO 27001 certification. ISO 27001 is a standard for ISMS (information security management systems) that...

read more
Effects of Cloud Complexities on Cybersecurity

Effects of Cloud Complexities on Cybersecurity

Venafi, a company that makes artificial ID solutions, recently conducted a study to learn more about the effects of cloud complexities on cybersecurity. According to a poll conducted by Venafi among 1,101 security decision-makers (SDMs) at enterprises with over 1,000...

read more
Student Loan Breach Exposes 2.5 Million Records

Student Loan Breach Exposes 2.5 Million Records

The Oklahoma Student Loan Authority (OSLA) and EdFinancial recently announced that over 2.5 million loanees were the victims of a severe data breach that has compromised their personal information. The target of the attack was a Lincoln, Nebraska-based web portal and...

read more
Chrome Bug Allows Webpages to Replace Clipboard Contents

Chrome Bug Allows Webpages to Replace Clipboard Contents

Browsers restrict webpages from accessing various forms of user data, and the user retains their right to share information with a website. However, a recent discovery reveals that Google Chrome has a security flaw that allows websites to change data contained in the...

read more
2022: Ransomware Attacks Are on the Rise

2022: Ransomware Attacks Are on the Rise

Cyberspace has enjoyed relative peace over the past few years due to a significant decline in ransomware attacks. This tranquility may be attributed to the combined efforts of several international intelligence agencies and various tech companies to eradicate...

read more
Zeppelin Ransomware Resurfaces with New Compromise

Zeppelin Ransomware Resurfaces with New Compromise

A Zeus variant that first surfaced in August 2016 called Zeppelin has resurfaced and is now being used to compromise Web servers to distribute its payload. The threat researchers at Forcepoint Security Labs said they first started seeing new Zeppelin malware samples...

read more
DEF CON returns with “Hacker Homecoming”

DEF CON returns with “Hacker Homecoming”

Organizers of DEF CON, the world's largest hacker conference, have announced a date for its 20th anniversary in Las Vegas. The event took place from August 7 to August 10, just after Black Hat USA in a move organizers say will allow both events to grow and be...

read more
Sneaky Orbit Malware Backdoors Linux Devices

Sneaky Orbit Malware Backdoors Linux Devices

Researchers have discovered a devious malware for Linux: backdooring devices and stealing data. The malware can alter the overall functioning of any device that it gets into. Popularly known as Orbit, the malware works differently from regular Linux threats. The...

read more
Beware the ‘Secret Agent’ Cloud Middleware

Beware the ‘Secret Agent’ Cloud Middleware

Last Thursday, at RSA Conference in San Francisco, the researchers from Wiz.io unveiled an open-source cloud middleware database on GitHub that details the particular middleware agents that Amazon Web Services (AWS), Google, and Microsoft put on their cloud customers'...

read more
Follina: A New Microsoft Zero-Day Attack is Now Underway

Follina: A New Microsoft Zero-Day Attack is Now Underway

Worried about fraud, employers are shifting to authentication technologies that are both secure and user-friendly. But there's a catch. Adversaries are actively exploiting a readily exploitable vulnerability in the Microsoft Support Diagnostic Tool (MSDT) in Windows,...

read more
Log4j Attack Surface Remains Massive

Log4j Attack Surface Remains Massive

Four months ago, the remote code execution hole exposed in the Apache Log4j logging tool still had a wide range of potential victims. Using the Shodan search engine, Rezilion discovered more than 90,000 Internet-exposed servers with a vulnerable version of the...

read more
Defending Your Business Against Russian Cyber Warfare

Defending Your Business Against Russian Cyber Warfare

As the West tightens its sanctions and supplies further assistance to Ukraine, we may anticipate Russian state-sponsored assaults to increase. The conflict in Ukraine is drawing attention from around the world. Russia has launched cyberattacks against Ukraine first,...

read more
New US Law to Require Cyber Incident Report

New US Law to Require Cyber Incident Report

Cybersecurity concerns have gained even greater significance in the recent Russia-backed SolarWinds sabotage and the Ukrainian war. In response, the US House and Senate will soon pass the Cyber Incident Reporting for Critical Infrastructure Act of 2022.  Shortly after...

read more
Mobile Threats Skyrocket

Mobile Threats Skyrocket

Although mobile devices are portable, powerful, and convenient, their use in employees' jobs is coming at a price. The very features that make them compelling also render them especially vulnerable to hacking. Data shows that nearly one-third of zero-day attacks now...

read more
Hacked US Companies to Face New Reporting Requirements

Hacked US Companies to Face New Reporting Requirements

When cybercriminals target sensitive data or charge companies or agencies a ransom to retrieve their encrypted information, the consequences can be dire. In response, Congress has passed a bill that will require that entities who deal with critical US security-related...

read more
High Severity WordPress Plugin Bug Hits Three Million

High Severity WordPress Plugin Bug Hits Three Million

According to security experts, a popular WordPress plugin contains a bug that could compromise user data and even hijack vulnerable websites. The solution is to update as soon as possible. The plugin, UpDraftPlus, is commonly used to back up users' data. As a result,...

read more
Security Concerns are Biggest Barrier to Cloud Adoption

Security Concerns are Biggest Barrier to Cloud Adoption

The adoption of cloud-based services continues to accelerate. In fact, 97 percent of those surveyed in recent Confluera research indicated that their organizations expect to expand their cloud deployments. To that end, many are enhancing the scope and extent of their...

read more
Researchers Warn of New Log4Shell-Like Java Vulnerability

Researchers Warn of New Log4Shell-Like Java Vulnerability

Security experts are driving our attention to the Log4Shell vulnerability in Java again. It has been around for several months. Although this new vulnerability known as CVE-2021-42392 has not yet been published in the National Vulnerability Database (NVD), experts are...

read more
Patch Log4j Now or Risk Major Fines

Patch Log4j Now or Risk Major Fines

Your information security vigilance can never be allowed to flag. Recently, the Federal Trade Commission underscored the importance of that point about the newly discovered Log4 Shell vulnerability. Companies that fail to take preemptive action by installing a patch...

read more
Data Breach Kicks U.S. Dental Patients in the Teeth

Data Breach Kicks U.S. Dental Patients in the Teeth

North American Dental Management is a company based in Pittsburgh responsible for providing administrative and technical support services to Professional Dental Alliance offices. On March 31st and April 1st of 2021, an unauthorized entity gained access to the...

read more
Gaming Industry Under Attack

Gaming Industry Under Attack

In December of 2020, after much fanfare, the CD Project Group launched Cyberpunk 2077. However, contrary to the hype, the game was riddled with bugs and soon earned a cascade of blistering customer feedback. Two months later, hackers capitalized on the game's bugs,...

read more
T-Mobile: 49 Million Customers Hit by Data Breach

T-Mobile: 49 Million Customers Hit by Data Breach

In the era when smartphones have become indispensable in so many aspects of life, data breaches can be more devastating than ever before. The recent T-Mobile attack is a perfect example of such breaches. Here is what we know about the incident: The first and last...

read more
Email Security in the Post-COVID Workplace

Email Security in the Post-COVID Workplace

The post-pandemic “new Normal” impacts all aspects of our lives, including the job site. Even when COVID was at its peak, collaboration among staff members scattered across the country and around the world happened thanks to adaptations in organizational technology...

read more
Data Leak in Fertility Clinic: Reasons & Consequences

Data Leak in Fertility Clinic: Reasons & Consequences

Georgia-based fertility clinic Reproductive Biology Associates is one of the latest victims of the recent rash of ransomware attacks plaguing our country. Data from an estimated 38,000 victims were compromised as a result of this breach. Reproductive Biology...

read more
Attackers Found New Ways to Exploit Google Docs

Attackers Found New Ways to Exploit Google Docs

Google Docs can provide your organization with excellent tools to promote real-time collaboration among team members at different locations. However, this cloud-based service can also be used by criminals to breach company's security protocols. As is often the case,...

read more