Cybersecurity Tools

New ”Domino” Malware Strain Targets Corporate Networks

Researchers recently discovered a new malware family named “Domino”, allegedly created by ITG14, also known as the FIN7 threat group. Reportedly, ex-Conti hackers have been using it since at least February 2023 to spread Project Nemesis info stealer or Cobalt Strike. Due to massive code overlap with the Lizar post-exploitation toolkit, researchers also attributed the […]

The post New ”Domino” Malware Strain Targets Corporate Networks appeared first on Heimdal Security Blog.

Cybersecurity Tools

Rheinmetall Suffers Another Cyberattack – Company Operations Still Functional

Rheinmetall, a leading German armaments and technology company, was targeted by a cyberattack over the weekend. The attack, however, did not affect company operations, according to officials. Rheinmetall, the largest arms company in Germany and one of the top three Western producers of military equipment and ammunition, is currently valued at more than 10 billion euros […]

The post Rheinmetall Suffers Another Cyberattack – Company Operations Still Functional appeared first on Heimdal Security Blog.

Cybersecurity Tools

What Is Data Minimisation? Definition & Examples

Data minimisation is a key part of information security and the GDPR (General Data Protection Regulation) in particular. Its principles are at the heart of effective data protection practices, and are intended to prevent privacy breaches and minimise the damage when security incidents occur. What is data minimisation? Data minimisation requires organisations to process personal data only if it serves a specific purpose, and to retain it for only as long as it’s needed to meet that purpose. Article 5(1) of the GDPR provides further guidance, explaining that organisations should consider three factors whenever they process personal information: Meeting the

The post What Is Data Minimisation? Definition & Examples appeared first on IT Governance UK Blog.

Cybersecurity Tools

7 tips for tackling cyber security technical debt

EXECUTIVE SUMMARY: The cyber risk landscape is evolving. Novel attack types are appearing at an unprecedented rate. Cyber criminals are constantly seeking new ways to infiltrate networks, paralyze systems, steal data and drive their own financial gains. As organizations race to keep up with emerging threats, it’s all-too-common for security leaders to ignore the growing […]

The post 7 tips for tackling cyber security technical debt appeared first on CyberTalk.

Cybersecurity Tools

Twitter no longer exists, it’s just X Corp. now

EXECUTIVE SUMMARY: In a move sparking intense speculation, Twitter technically “no longer exists” after a merge with X Corp., according to a document submitted to a California court earlier this month. What the change means for Twitter is unclear. In the past, Twitter’s owner, Elon Musk, suggested that purchasing the company would accelerate plans to […]

The post Twitter no longer exists, it’s just X Corp. now appeared first on CyberTalk.

Cybersecurity Tools

The new & dangerous way Log4j is being exploited

EXECUTIVE SUMMARY: The Log4j vulnerability posed a multi-faceted challenge for organizations and management teams worldwide. Leading cyber security authorities have urged organizations to remain acutely aware of the persistent dangers posed by Log4j threats. In the eyes of some experts, Log4j represented one of the most dangerous flaws disclosed in recent years. Upon its discovery, […]

The post The new & dangerous way Log4j is being exploited appeared first on CyberTalk.

Cybersecurity Tools

Check Point’s President on her journey, vision and growth strategy

EXECUTIVE SUMMARY: In this powerful and engaging interview, Check Point’s President Rupal Hollenbeck dynamically describes how the company’s innovation is redefining real-world potentialities, she shows how smart storytelling is a success benchmark, she provides candid insights into an unwavering commitment to diversity and inclusion, and she shares a key message… Read this interview to discover […]

The post Check Point’s President on her journey, vision and growth strategy appeared first on CyberTalk.

Exit mobile version