Ransom House
You must login to view this content
You must login to view this content
Andrei Vladimirovich Tarasov, a 33-year-old Russian cybercrime figure known online as “Aels,” has returned to Russia after evading US extradition. Released from Berlin’s Moabit Prison on January 5, 2024, Tarasov had been held for approximately six months following his July 2023 arrest on computer crime charges. The Berlin Superior Court of Justice determined that US […]
The post Cybercriminal Andrei Tarasov Escapes US Extradition, Returns to Russia appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
The Linux Foundation this week made available a customizable reference guide intended to help organizations identify critical cybersecurity skills requirements.
The post Linux Foundation Shares Framework for Building Effective Cybersecurity Teams appeared first on Security Boulevard.
Police disrupt cybercrime ops, malicious NPM package hides malware via Unicode, and spies leverage zero-day in enterprise messaging app.
The post The Good, the Bad and the Ugly in Cybersecurity – Week 20 appeared first on SentinelOne.
Regarding the open letter that hit a nerve at RSAC this year for calling out lack of reliability, accountability and transparency on the part of some security vendors, consider this: A security vendor that profits from providing the very data needed to detect and respond to threats is not a partner; they are a potential obstacle. True security collaboration necessitates transparent and unfettered access to logs. Watch out for security vendors who basically charge you for the info you need to fight threats: They're more of a roadblock than a helper.
The post Cybersecurity Insights with Contrast CISO David Lindner | 05/16/25 appeared first on Security Boulevard.
In April 2025, cybersecurity teams were starkly reminded of the stakes involved in patch management when Microsoft disclosed CVE-2025-29824, a zero-day privilege escalation flaw in the Windows Common Log File System (CLFS) driver. Exploited by ransomware groups to gain SYSTEM-level access, this vulnerability targeted organizations across sectors in the U.S., Venezuela, Spain, and Saudi Arabia. The […]
The post Windows Security Updates – How to Stay Ahead of Vulnerabilities appeared first on Cyber Security News.
Check out a study that outlines the risks and benefits of open-source AI tools. Meanwhile, the NCSC unpacks use cases for new, alternative encryption technologies. Plus, ISACA urges orgs to begin their post-quantum cryptography migration. And get the latest on assessing software products’ security; cyber attacks against critical infrastructure; and more!
Dive into six things that are top of mind for the week ending May 16.
1 - Study: Orgs embrace open source AI, but cyber risk concerns loomAs organizations increasingly adopt open-source artificial intelligence (AI) technologies, they also worry about facing higher risks than those posed by proprietary AI products.
That’s according to the report “Open source technology in the age of AI” from McKinsey Co., the Patrick J. McGovern Foundation and Mozilla, based on a global survey of 700-plus technology leaders and senior developers.
Specifically, while respondents cite benefits like lower costs and ease of use, they consider open source AI tools to be riskier in areas like cybersecurity, compliance and intellectual property.
If your organization is looking at or already adopting open source AI products, here are risk mitigation recommendations from the report:
For more information about AI security, check out these Tenable resources:
Organizations mulling the use of emerging cryptographic techniques may find a new white paper from the U.K. National Cyber Security Centre (NCSC) helpful.
Titled “Advanced Cryptography: Deciding when to use Advanced Cryptography to protect your data,” the document seeks to educate organizations about new, advanced cryptography options so that they can make informed decisions about how and whether to use them.
“These emerging techniques, collectively called Advanced Cryptography, can be used in scenarios where traditional cryptography may be insufficient,” the white paper reads.
Specifically, the NCSC defines advanced cryptography as “a range of techniques that use cryptographic methods to provide data-processing functionality” that goes beyond what’s possible with traditional cryptographic methods.
“Our white paper considers the new forms of cryptography that are emerging in academia (and are being developed by industry) to tackle problems that can’t be solved simply by encrypting, decrypting, signing, and verifying information,” an NCSC blog reads.
However, because advanced cryptography techniques are newer, their security isn’t as well understood, and they may be slower and more expensive, according to the NCSC.
“When deciding whether to use Advanced Cryptography, start with a clear articulation of the problem, and use that to guide the development of an appropriate solution,” the document says.
For example, advanced cryptography techniques might be an appropriate option for securing data processing if the scenario involves all or most of these elements:
Advanced cryptography techniques discussed in the white paper include:
For more information about new, emerging forms of cryptography:
Most organizations remain woefully unprepared for tackling the future threat that quantum computers will pose to the data they store and handle – and the clock is ticking.
That’s the key finding from ISACA’s “2025 Quantum Computing Pulse Poll,” which surveyed almost 2,700 cybersecurity, audit, risk and data-privacy professionals globally.
Specifically, 95% of respondent organizations haven’t drafted a roadmap for transitioning to post-quantum cryptography. Only 5% consider the quantum threat a high business priority today.
Here’s the issue: Quantum computers, expected to become available sometime between 2030 and 2040, will be able to decrypt data protected with today’s public-key cryptographic algorithms.
Thus, the consensus is that organizations need to start migrating now to post-quantum cryptography – also known as quantum-resistant cryptography – because the process is complex and requires careful planning and deployment.
To help organizations get started, ISACA is offering a roadmap template for adopting quantum-resistant cryptography, with specific actions to take now, including:
In short, ISACA recommends that organizations plan to encrypt all new data using post-quantum cryptography; re-encrypt all existing data; and make this transition a priority today.
In March, NIST picked its fifth algorithm for post-quantum encryption, which it expects will be widely available for use in 2027. NIST released three quantum-resistant algorithm standards last year and expects to release a fourth one in 2026.
Other resources for helping organizations plan their migration to quantum-resistant cryptography include NIST’s draft white paper “Considerations for Achieving Crypto Agility,” and the U.K. National Cyber Security Centre’s “Timelines for migration to post-quantum (PQC) cryptography.”
To get more details about the ISACA survey, check out these resources:
For more information about how to protect your organization against the quantum computing cyberthreat:
In an attempt to prompt software makers to build safer products, the U.K.’s National Cyber Security Centre (NCSC) has published a voluntary “Software Code of Practice” that outlines a baseline of cybersecurity, resilience and privacy features and controls that software should offer.
“It signals – to both software vendors and their customers – what can reasonably be expected from software suppliers and defines the minimum set of actions that should be in place to ensure products and services are resilient to a cyber attack from a commodity threat,” reads an NCSC blog.
The Software Code of Practice outlines 14 principles grouped into four core areas:
For more information about how to assess the security of commercial software products:
Inexperienced hackers are successfully targeting operational technology (OT) systems of critical infrastructure organizations using simple attack methods that exploit weak cyber hygiene.
That’s the warning from CISA, which is urging critical infrastructure organizations to implement basic, foundational cybersecurity measures that’ll help them fend off these unsophisticated attackers.
“Although these activities often include basic and elementary intrusion techniques, the presence of poor cyber hygiene and exposed assets can escalate these threats,” reads a CISA statement.
Specifically, these “low-hanging fruit” breaches can open the door for website defacements, configuration changes, operational disruptions and physical damage.
In a new fact sheet titled “Primary Mitigations to Reduce Cyber Threats to Operational Technology,” CISA offers mitigation recommendations, including:
For more information about OT security, check out these Tenable resources:
For the seventh straight quarter, SocGholish, which powers fake-software update attacks, has ranked as the most prevalent malware variant, a sign that this type of attack remains a top moneymaker for hackers.
That’s according to the Center for Internet Security’s “Top 10 Malware Q1 2025” list of the malware variants responsible for the most infections.
Specifically, SocGholish accounted for 48% of all malware infections during 2025’s first quarter.
In a fake software-update attack, the victim is tricked into installing what appears as a legitimate update for, say, their preferred browser. In reality, the downloaded software is laced with malware.
(Source: Center for Internet Security, May 2025)
Here’s the full list of the most prevalent malware variants in the first quarter of 2025, in descending order:
To get more information, check out the CIS blog “Top 10 Malware Q1 2025,” where you’ll find more details, context and indicators of compromise for each malware strain.
For details on fake update attacks:
VIDEOS
Fake Chrome Update Malware (The PC Security Channel)
Beware Google Chrome fake update browser pop ups that bring malware (Windows, Computers and Technology)
Multiple users and IT administrators are reporting that Microsoft’s latest security update KB5058379, released on May 13, 2025, is causing widespread issues with BitLocker recovery prompts and system boot failures. This mandatory Patch Tuesday update, which contains critical security fixes, is unexpectedly forcing many Windows 10 computers into recovery mode after installation. According to numerous […]
The post Windows 10 KB5058379 Update Boots PCs into Windows Recovery appeared first on Cyber Security News.
The major data breach of cryptocurrency exchange Coinbase could cost the company as much as $400 million, it told the SEC. However, rather than pay the $20 million extortion demand, Coinbase issued a $20 million bounty on the hackers.
The post Coinbase Says Breach May Cost $400 Million, Issues $20 Million Bounty appeared first on Security Boulevard.
Defining wire communications, and whether the wiretap statute makes it illegal to listen to a podcast or watch a movie online?
The post Is it Illegal to Listen to a Podcast or Watch a Movie Online? appeared first on Security Boulevard.
You must login to view this content
Here’s why CIOs must lead post-quantum cryptography adoption in 2025 to secure digital assets and future-proof organizations.
The post Preparing for the post-quantum era: a CIO’s guide to securing the future of encryption appeared first on CyberScoop.