Google's unusual move to shut down an active counterterrorism operation being conducted by a Western democracy

Skip to Content The decision to block an "expert" level cyberattack has caused controversy inside Google after it emerged that the hackers in question were working for a US ally.

MIT Technology Review

Whistleblower: Ubiquiti Breach "Catastrophic"

On Jan. 11, Ubiquiti Inc. [NYSE:UI] - a major vendor of cloud-enabled Internet of Things (IoT) devices such as routers, network video recorders and security cameras - disclosed that a breach involving a third-party cloud provider had exposed customer account credentials. Now a source who participated in the incident response to that breach alleges Ubiquiti...

Krebsonsecurity

America's digital defender is underfunded, outmatched and 'exhausted'

Workers at an Amazon warehouse in the town of Bessemer have submitted their votes in an election that could shape the fate of Amazon - and the future of the labor movement in the U.S. CISA "just can't do the job that they need to do," Rep. Dutch Ruppersberger (D-Md.)

POLITICO

T-Mobile, Verizon, AT&T Stop SMS Hijacks After Motherboard Investigation

All the mobile carries have mitigated a major SMS security loophole that allowed a hacker to hijack text messages for just $16.

Vice

EXCLUSIVE-Software vendors would have to disclose breaches to U.S. government users under new order - sources

(Adds details) SAN FRANCISCO, March 25 (Reuters) - A planned Biden administration executive order will require many software vendors to notify their federal government customers when the companies have a cybersecurity breach, people consulted on the draft order said on Thursday.

U.S.

The Consumer Authentication Strength Maturity Model (CASMM) | Daniel Miessler

See where a user's internet hygiene currently is, and how to improve it This post is an attempt to create an easy-to-use security model for the average internet user. Basically, how secure is someone's current behavior with respect to passwords and authentication, and how can they improve?

Daniel Miessler

Portrait of a Digital Weapon - Mac Pierce

Portraiture of weapons has been a part of art for as long as there have been armies. While this practice is well established for other traditional weapons, this piece displays the first in a new type of weapon, the nation state cyber attack.

Mac Pierce

Exclusive: Software vendors would have to disclose breaches to U.S. government users under new order: draft

SAN FRANCISCO/WASHINGTON (Reuters) - A planned Biden administration executive order will require many software vendors to notify their federal government customers when the companies have a cybersecurity breach, according to a draft seen by Reuters. A National Security Council spokeswoman said no decision has been made on the final content of the executive order.

U.S.

AP sources: SolarWinds hack got emails of top DHS officials

Suspected Russian hackers gained access to email accounts belonging to the Trump administration's head of the Department of Homeland Security and members of the department's cybersecurity staff whose jobs included hunting threats from foreign countries, The Associated Press has learned.

AP NEWS

Critical netmask networking bug impacts thousands of applications

Popular npm component netmask has a critical networking vulnerability, CVE-2021-28918. netmask is frequently used by hundreds of thousands of applications to parse IPv4 addresses and CIDR blocks or compare them. The component gets over 3 million weekly downloads, and as of today, has scored over 238 million total downloads.

BleepingComputer