Tag: vulnerabilities

regs-compliance

Screening Your Supply Chain: How Far Will You Go For Cybersecurity?

Cybersecurity is crucial in supply chains, where risks can affect all connected parties. U.S. companies must now ensure compliance with evolving standards like the DoD’s CMMC, affecting over 200,000 contractors and their suppliers. With significant consequences and substantial government contracts at stake, effective risk management and rigorous vetting processes are critical for protection against data breaches and maintaining security across networks.

Hacker AI Image

Spotlight Podcast: How AI Is Reshaping The Cyber Threat Landscape

Host Paul Roberts speaks with Jim Broome, the CTO and President of DirectDefense about the evolution of cybersecurity threats and how technologies like AI are reshaping the cybersecurity landscape and the work of defenders and Managed Security Service Providers (MSSPs).

Bitcoin cryptocurrency

Malicious Python Packages Target Crypto Wallet Recovery Passwords

A newly discovered campaign pushing malicious open source software packages is designed to steal mnemonic phrases used to recover lost or destroyed crypto wallets, according to a report by ReversingLabs.

Robot Vacuum Liberation

Episode 254: Dennis Giese’s Revolutionary Robot Vacuum Liberation Movement

Security researcher and IoT hacker Dennis Giese talks about his mission to liberate robot vacuums from the control of their manufacturers, letting owners tinker with their own devices and – importantly – control the data they collect about our most intimate surroundings.

Aliquippa sewer plant

FBI: Iranian APT Targets Israeli-Made PLCs Used In Critical Industries

The hack of a Pennsylvania water treatment facility in November is part of a larger campaign by an Iranian APT group against users of Israel-made operational technology.