In November, Ukraine’s president revealed that the country’s IT defenses fended off more than 1,300 Russian cyberattacks, including attacks on satellite communications infrastructure. The onslaught of cyberattacks highlights one of the shifts in advanced persistent threat (APT) attacks seen in the past year: In 2022, geopolitical tensions ratcheted up, and along with them, cyber operations…

Ukrainian President Volodymyr Zelensky spoke to the G20 Summit’s “Digital Transformation” panel this week, offering the benefits of his embattled country’s cyber-defense experience to G20-allied countries. Zelensky noted that Ukraine’s “IT army,” made up of talent pooled from companies across the country, has successfully stopped more than 1,300 Russian cyberattacks over the past eight months…

A few state and local governments appeared to be hit by a relatively rudimentary form of cyberattack that periodically made public websites unreachable. But U.S. and local officials said Wednesday that none breached vote-counting infrastructure. “We have seen no evidence that any voting system deleted or lost votes, changed votes, or was any way compromised…

The new funding round was led by U.S. Venture Partners, with additional investment from Bess Ventures, Citi Ventures, Stanford University, World Trade Ventures, and angel investors. Founded in 2016, the Rockville, Maryland-based firm provides physical layer-based asset risk management capabilities, helping organizations deal with known and shadow IT assets at any scale. Basically, Sepio helps…

Fortifying cybersecurity defenses remains a work in progress for many organizations, who acknowledge their shortcomings but have yet to commit the necessary resources to the effort, new research from CompTIA, the nonprofit association for the information technology (IT) industry and workforce, reveals. “Risk mitigation is the key, the filter through which everything should be viewed.”…

Both companies have confirmed being breached. Uber admitted that a hacker used compromised employee credentials to access internal tools, but downplayed impact, insisting that development systems, user accounts, and sensitive information were not accessed. In the case of Rockstar, the hacker leaked videos recorded during the development of the upcoming Grand Theft Auto (GTA) 6…

Twitter’s former head of security has blown the whistle on what he characterizes as sprawling cybersecurity weaknesses, including vulnerabilities that could lay the social media platform open to cyberattacks that could have major national-security implications. That’s the allegation from Peiter “Mudge” Zatko, who sent a 200+-page disclosure to Congress detailing issues that he claims could…

Transport layer security (TLS) is the modern version of the now-deprecated secure socket layer (SSL) protocol. Due to multiple vulnerabilities within SSL, organizations require a more robust protocol to coincide with the increasing number of web-based technologies. For example, unlike SSL, TSL allows you to negotiate encryption on regular ports and protocols such as IMAP…