Cybersecurity frameworks and models are incredibly important and provide a consistent set of guidance, principles, and standards that security leaders can follow, use to build their roadmaps, and base their…
Tag: exam
The Log4j Vulnerability Is Now Used by State-Backed Hackers
The vulnerability, officially tagged as CVE-2021-44228 and called Log4Shell or LogJam, is an unauthenticated RCE vulnerability that allows total system takeover on systems running Log4j 2.0-beta9 through 2.14.1. What Happened? Nation-state hackers…
Homeland Security Offering $5,000 Bug Bounty to Hack DHS
The program will allow hackers and security researchers to earn between $500 to $5,000 for identifying verified vulnerabilities. The US Department of Homeland Security (DHS) has announced a new bug…
Ransomware Attackers Have ‘Industry Standards’ Too
Security Intelligence – Security Intelligence – Ransomware Attackers Have ‘Industry Standards’ Too Ransomware attackers are creating ‘industry standards’ and using them to define an ideal target for their campaigns. The…
Digital ID age verification trials for online alcohol purchases in Australia underway
The Digital Transformation Agency (DTA) has been carrying out digital identity age verification trials for online alcohol purchases with selected providers in Australia since September, according to a Freedom of…
Cybersecurity experts debate concern over potential Log4j worm
As the fallout from the Log4j vulnerability continues, cybersecurity experts are debating what the future might hold. Tom Kellermann, VMware’s head of cybersecurity strategy, said the Log4j vulnerability is one…
NSO Group's latest spyware on par with nation-state abilities, researchers say
Written by AJ Vicens Dec 15, 2021 | CYBERSCOOP When Apple announced Nov. 23 that it filed a lawsuit against Israeli spyware firm NSO Group, it claimed that the firm…
DHS Launches Bug Bounty Program
DHS Launches Bug Bounty Program The United States Department of Homeland Security has launched a new bug bounty program to identify potential cybersecurity vulnerabilities and increase the department’s cybersecurity resilience. …