-
11 votes
-
Blackhat hacker 'EncryptHub' behind vibe-coded ransomware unmasked due to opsec mistakes in ChatGPT-created infrastructure
20 votes -
Paged out! issue 6
18 votes -
Back to cash: life without money in your pocket is not the utopia Sweden hoped
34 votes -
PassKey account takeover in all mobile browsers (via Bluetooth)
21 votes -
What are the best truly unbeatable E2EE, presumably P2P messaging apps?
My thoughts are that apps can have end-to-end encryption, but if the app on the end is still connected to someone's servers, there's nothing stopping them from pulling the contents of the chat...
My thoughts are that apps can have end-to-end encryption, but if the app on the end is still connected to someone's servers, there's nothing stopping them from pulling the contents of the chat after it's been decrypted on the other end. What options do we have for messaging that don't have this issue? I understand that anything that I can see can still get taken by the OS, etc., but I'm curious about that first step.
28 votes -
Living off Microsoft Copilot - risks and threats of Copilot
7 votes -
Australia implements new anti scam regulations
8 votes -
8 million requests later, we made the SolarWinds supply chain attack look amateur
10 votes -
Phishing tests, the bane of work life, are getting meaner
32 votes -
UK orders Apple to let it spy on users’ encrypted accounts
49 votes -
How US school cyber attacks get hidden from those impacted and the public
10 votes -
Hacking Subaru: Tracking and Controlling Cars via the STARLINK Admin Panel
18 votes -
Unique 0-click deanonymization attack targeting Signal, Discord and hundreds of platform
50 votes -
Too many people don’t value the time of security researchers
22 votes -
Remote code execution via MIDI messages
13 votes -
US Treasury says its computers were hacked by a Chinese 'threat actor' in a 'major incident'
45 votes -
More US telcos confirm Salt Typhoon breaches as White House weighs in
20 votes -
US officials urge Americans to use encrypted apps amid unprecedented cyberattack
50 votes -
Misogynist hacker who threatened the wrong woman (hacker) and found out
23 votes -
CrowdStrike avoids customer exodus after triggering global IT outage
24 votes -
Craig Newmark, of Craigslist, is giving away $300 million to improve cybersecurity infrastructure
22 votes -
Top US senator calls Salt Typhoon ‘worst telecom hack in our nation’s history’
37 votes -
Bitwarden switches password manager and SDK to GPL3 after FOSS-iness drama
54 votes -
Hackers take control of robot vacuums in multiple US cities, yell racial slurs
37 votes -
More people than ever are trying to hack the US government--and they love it
11 votes -
Using YouTube to steal your files
40 votes -
Kaspersky deletes itself, installs UltraAV antivirus without warning
22 votes -
Data security help - SOC2ish
Hi Tilderinos, I head up a small startup and we're looking to get some support for our data security. Up until now we've worked with small mom and pops that didn't have any requirements, but a few...
Hi Tilderinos,
I head up a small startup and we're looking to get some support for our data security. Up until now we've worked with small mom and pops that didn't have any requirements, but a few of our new clients have full data security teams and our infrastructure and policies/protocols aren't up to snuff. We reached out to a few consulting firms and they quotes us between $80-100k to get things set up and run us through a full SOC2 review. As a small company we don't really have that type of budget, more like $40-50k. I stumbled upon Vanta and Drata as alternatives and had meetings with their sales folks last week. Both of their offerings from setting up our protocols to monitoring and getting us through a SOC2 were only $16k.
Are platform based companies like Vanta or Drata enough to get us off the ground while we're still getting set up? Has anyone worked with them before and have any feelings one way or the other? Should we be signing on with a security consulting company - be it at a lower rate if we can negotiate it?
This is all quite new to me and any insight folks here can provide would be incredible useful.12 votes -
CrowdStrike estimates the tech meltdown caused by its bungling left a $60 million dent in its sales
37 votes -
US lawsuits against Crowdstrike begin with Delta Airlines and Crowdstrike shareholders filing suit
21 votes -
Chinese government hackers penetrate US internet providers to spy
17 votes -
Microsoft to host security summit after CrowdStrike disaster
16 votes -
“Something has gone seriously wrong,” dual-boot systems warn after Microsoft update
43 votes -
The gigantic and unregulated power plants in the cloud
12 votes -
Signal developer explains why early encrypted messaging tools flopped
35 votes -
Delta CEO says CrowdStrike-Microsoft outage cost the US airline $500 million, will seek damages
44 votes -
FrostyGoop malware attack cut off heat in Ukraine during winter
17 votes -
CrowdStrike global outage to cost US Fortune 500 companies $5.4bn
35 votes -
Anyone can access deleted and private repository data on GitHub
46 votes -
A hacker ‘ghost’ network is quietly spreading malware on GitHub
21 votes -
Delta's CrowdStrike related flight delays and cancellations prompt Department of Transportation investigation
19 votes -
CrowdStrike code update bricking Windows machines around the world
143 votes -
Weak security defaults enabled Squarespace Domains hijacks of former Google Domains accounts
19 votes -
AT&T says criminals stole phone records of ‘nearly all’ US customers in new data breach
26 votes -
Patelco makes minor restorations but no end near for crippling credit union cyber attack
21 votes -
Shopping app Temu is “dangerous malware,” spying on your texts, lawsuit claims
45 votes -
Simple ways to find exposed sensitive information
9 votes -
Single point of software failure could hamstring 15K US car dealerships for days
22 votes -
This GitHub profile has a custom background
31 votes