You might be interested in …

Daily NCSC-FI news followup 2021-06-06

Hacker lexicon: What is a supply chain attack? arstechnica.com/information-technology/2021/06/hacker-lexicon-what-is-a-supply-chain-attack/ Cybersecurity truisms have long been described in simple terms of trust: Beware email attachments from unfamiliar sources and don’t hand over credentials to a fraudulent website. But increasingly, sophisticated hackers are undermining that basic sense of trust and raising a paranoia-inducing question: what if the legitimate […]

Read More

Daily NCSC-FI news followup 2021-09-18

Researchers compile list of vulnerabilities abused by ransomware gangs www.bleepingcomputer.com/news/security/researchers-compile-list-of-vulnerabilities-abused-by-ransomware-gangs/ Security researchers are compiling an easy-to-follow list of vulnerabilities ransomware gangs and their affiliates are using as initial access to breach victims’ networks. All this started with a call to action made by Allan Liska, a member of Recorded Future’s CSIRT, on Twitter over the […]

Read More

[SecurityWeek] Google Patches High-Risk Android Security Flaws

All posts, Security Week

Google this week pushed out a security-themed Android update with fixes for more than 30 security flaws that expose mobile users to a range of malicious hacker attacks. The latest Android update provides documentation on 33 security bugs, some serious enough to cause privilege escalation or information disclosure compromises. read more Source: Read More (SecurityWeek […]

Read More