What happens when a cybersecurity company gets phished?
A Sophos employee was phished, but we countered the threat with an end-to-end defense process
From Detection to Resolution: Why the Gap Persists A critical vulnerability is identified in an exposed cloud asset. Within hours, five different tools alert you about it: your vulnerability scanner, XDR, CSPM, SIEM, and CMDB each surface the issue in their own way, with different severity levels, metadata, and context. What’s missing is a system…
The Computer Emergency Response Team of Ukraine (CERT-UA) has disclosed details of a phishing campaign that’s designed to deliver a malware codenamed LAMEHUG. “An obvious feature of LAMEHUG is the use of LLM (large language model), used to generate commands based on their textual representation (description),” CERT-UA said in a Thursday advisory. The activity has…
In the wake of any disaster or tragedy, there are always some sleazebags who will try to capitalize on the situation to scam or defraud people. The recent tragic Tai Po fire in Hong Kong is a time for national grief and support. In a media statement, the South Korean Privacy Commissioner’s Office is urging……
Ninfa Saavedra reports: Texas Attorney General Ken Paxton has filed a lawsuit against PowerSchool, a California-based provider of cloud-based services for K-12 schools, after an unprecedented data breach exposed the sensitive personal identifying information and protected health information of more than 880,000 Texas school-aged children and teachers, including Houston ISD schools. According to Paxton, PowerSchool’s……
A big monetary penalty was anticipated for SK Telecom after a massive data breach. Now we know how big. Muhammad Zulhusni reports: South Korea’s biggest mobile carrier has been hit with a record fine after a massive data breach exposed the personal details of nearly half the country’s people. The Personal Information Protection Commission (PIPC)……
A look under the hood at a tool designed to disable protections