ZDNet Security
With its acquisition of Auth0, Okta goes all in on CIAM
Yesterday, Okta announced plans to acquire Auth0 for $6.5B in an all-stock transaction. With this purchase and valuation, Okta is raising its bet and going all in on CIAM.
Categories: ZDNet Security
GAO report finds DOD's weapons programs lack clear cybersecurity guidelines
A new report found that the Department of Defense fails to communicate clear cybersecurity guidelines to contractors tasked with building systems for its weapons programs.
Categories: ZDNet Security
Singapore Airlines frequent flyer members hit in third-party data security breach
Data belonging to 580,000 Krisflyer and PPS members have been compromised in a cybersecurity attack that hit air transport IT company SITA, making Singapore Airlines the second carrier in the week to report a data breach.
Categories: ZDNet Security
Ransomware as a service is the new big problem for business
Easy-to-use ransomware as a service schemes are booming, accounting for almost two-thirds of ransomware campaigns during the past year, warn researchers.
Categories: ZDNet Security
Accellion zero-day claims a new victim in cybersecurity company Qualys
A hotfix was applied, but not before some customer files may have been compromised.
Categories: ZDNet Security
Microsoft: We're cracking down on malware that uses Excel macros
A new antivirus and Office 365 integration from Microsoft allows for scanning malicious macro scripts written in XLM at runtime.
Categories: ZDNet Security
Linux distributions: All the talent and hard work that goes into building a good one
Recent posts to the Linux Mint blog have got me thinking about some of the issues in maintaining a Linux distribution.
Categories: ZDNet Security
CISA issues emergency directive to agencies: deal with Microsoft Exchange zero-days now
Patch now, or disconnect Microsoft Exchange services from the internet.
Categories: ZDNet Security
Okta and Auth0: A $6.5 billion bet that identity will warrant its own cloud
There are clouds for infrastructure, CRM, HR and other business functions. Is identity going to be one of the handful of clouds in the enterprise?
Categories: ZDNet Security
Maza Russian cybercriminal forum suffers data breach
Forums can be areas to swap illicit tools and data, but they can also be the targets of cyberattackers in their turn.
Categories: ZDNet Security
Twitter and Twitch added to list of those concerned with Australia's Online Safety Bill
Facebook, meanwhile, is unsure why the government is expanding cyberbullying takedown schemes to private messaging.
Categories: ZDNet Security
High severity Linux network security holes found, fixed
This nasty set of bugs can lead to an attacker gaining root access, but the patch is already available.
Categories: ZDNet Security
Ursnif Trojan has targeted over 100 Italian banks
1,700 credentials were stolen from a single payment processor.
Categories: ZDNet Security
Google takes next steps towards 'privacy-first' web devoid of third-party cookies
US tech giant will release its Federated Learning of Cohorts for developer trials this month and advertiser tests with Google Ads next quarter, during which it hopes to glean insights on how well the alternative to cookie-based ad targeting will work in diverse regions such as Asia.
Categories: ZDNet Security
Microsoft account hijack vulnerability earns bug bounty hunter $50,000
The researcher says he could have abused the bug to hijack Microsoft accounts.
Categories: ZDNet Security
Google patches actively exploited Chrome browser zero-day vulnerability
Upgrading your Chrome build as quickly as possible is recommended.
Categories: ZDNet Security
Microsoft: These Exchange Server zero-day flaws are being used by hackers, so update now
Hafnium state-sponsored threat actor was exploiting four previously unknown flaws in Exchange servers.
Categories: ZDNet Security
SEC charges group for alleged pump-and-dump Airborne Wireless stock scam
SEC claims investors were defrauded out of $45 million.
Categories: ZDNet Security
This dangerous ransomware is using a new trick to encrypt your network
Ryuk ransomware now has the ability to use a worm-like capability to spread itself to any Windows machine on the same network as the initial compromise, warns cybersecurity agency.
Categories: ZDNet Security
New app rollout helps reduce paperwork for NSW frontline child protection caseworkers
The ChildStory Mobile will give caseworkers access to real-time information on-the-go.
Categories: ZDNet Security