Two Nigerian nationals have been sentenced to prison in the United States for their roles in Business Email Compromise (BEC) schemes, the U.S. Department of Justice announced.
3 Key Questions for CISOs on the Wave of Historic Industrial Cybersecurity Legislation
The last 18 months have been nothing short of historic for critical infrastructure companies. First, came a series of dramatic developments that highlighted the risks to industrial environments:
GoDaddy Says Several Brands Hit by Recent WordPress Hosting Breach
Domain registrar and web hosting giant GoDaddy says the recently disclosed data breach impacts several of its brands, including 123Reg, Domain Factory, Heart Internet, Host Europe, Media Temple and tsoHost.
CISA, FBI Warn of Potential Critical Infrastructure Attacks on Holidays
The United States Cybersecurity and Infrastructure Security Agency (CISA) and the Federal Bureau of Investigation (FBI) this week reminded organizations of all types – with a focus on critical infrastructure – that cybercriminals tend to launch impactful cyberattacks during holidays and weekends.
Researcher Awarded $10,000 for Google Cloud Platform Vulnerability
Security researcher David Schütz says he received over $10,000 in bug bounty payouts from Google after reporting a Google Cloud project vulnerability and subsequent bypasses to rolled-out fixes.
Industrial Cybersecurity Firm Applied Risk Acquired by DNV
Norway-based assurance and risk management solutions provider DNV is acquiring industrial cybersecurity company Applied Risk in an effort to create an “industrial cybersecurity powerhouse.”
The companies will merge under the DNV brand. Financial terms of the deal have not been disclosed.
Apple Slaps Lawsuit on NSO Group Over Pegasus iOS Exploitation
The troubles for Israeli surveillance software maker NSO Group continue to pile up with news that Apple has filed suit to ban the company from using its software, services or devices.
PoC Exploit Published for Latest Microsoft Exchange Zero-Day
A security researcher has released proof-of-concept (PoC) exploit code for a recently patched code execution vulnerability affecting on-prem Microsoft Exchange Server installations.
Preventing a Cyber Pandemic in Healthcare
Without the sacrifice of our frontline workers over the past two challenging years, many of our communities would not have been able to receive vital care. However, while healthcare providers have been busy protecting our communities, who has protected the sensitive personal data collected in the process?
Serious Vulnerability Found in Imunify360 Web Server Security Product
A vulnerability discovered in CloudLinux’s Imunify360 security product could have been exploited for remote code execution using specially crafted files.


