Industry Spotlight

Google Yahoo spam

Google, Yahoo to Put Tighter Spam Restrictions on Bulk Senders

| | google, Phishing, Spam, Yahoo
Email giants Google and Yahoo are putting tighter requirements on bulk email senders in hopes of reducing the massive amounts of spam that hammer inboxes every day and deflecting the phishing and other cyberthreats that hide within it. Google’s AI-enabled email defense systems every day block almost 15 billion unwanted ... Read More
SpyCloud MFA Systems Vulnerable Authentication Bypass

CISA and NSA Offer MFA and SSO Guidelines for Developers, Vendors

| | cisa, Cybersecurity, MFA, nsa, Phishing
Developers and tech vendors need to improve multifactor authentication (MFA) and single sign-on (SSO) tools and make them easier for organizations to use to reduce the threat of phishing, password spraying, and similar cyberattacks, according to the nation’s largest cybersecurity agencies. The Cybersecurity and Infrastructure Security Agency (CISA) and National ... Read More
software code antivirus

Two Campaigns Drop Malicious Packages into NPM

The popular NPM code registry continues to be a target of bad actors looking to sneak their malicious packages into open-source code used by software developers. Researchers with Fortinet’s FortiGuard Labs this week said they found almost three dozen malicious packages in the registry that contain scripts that make them ... Read More
cloud security palo alto networks Deloitte Broadcom report cloud security threat

AWS’ MadPot Honeypot Operation Corrals Threat Actors

Engineers with Amazon Web Services more than a decade ago began developing tools to better collect intelligence on the cyberthreats coming into the giant cloud provider’s IT environment Fast forward to now, and AWS’s sophisticated suite of tools – called MadPot – comprises myriad monitoring sensors and automated response features ... Read More
SASE network penetration F5

CISA Rolls Out a HBOM Framework to Secure Hardware Components

| | cisa, Cybersecurity, IT hardware, SBOM
The federal government for the past few years has focused on protecting the software supply chain in the wake of such high-profile incidents as the SolarWinds hack in 2020 and the Log4j vulnerability a year later. A key part of that has been software bills-of-materials (SBOMs), an inventory of the ... Read More
data privacy security

Lawsuit Filed Against Google, Meta, H&R Block for Sharing Taxpayer Data

Meta, Google, and giant tax preparer H&R Block are being accused of conspiring to illegally use spyware from the tech giants to collect and share tax return information from hundreds of taxpayers that could be used to generate targeted online ads. The three companies – along with Google parent Alphabet ... Read More