Operation Crimson Palace: Sophos threat hunting unveils multiple clusters of Chinese state-sponsored activity targeting Southeast Asian government

Threat clusters targeted a government agency for cyberespionage in a campaign that had precursors dating back to early 2022. Written by Paul Jaramillo, Morgan Demboski, Mark Parsons JUNE 05, 2024 In May 2023, in a threat hunt across Sophos Managed Detection and Response telemetry, Sophos MDR’s Mark Parsons uncovered a complex, long-running Chinese state-sponsored cyberespionage operation we have dubbed “Crimson Palace” targeting a high-profile government organization in Southeast Asia. MDR launched the hunt […]

read more

FCC moves ahead on internet routing security rules

The Border Gateway Protocol regulations proved less controversial than a $200 million school and library cyber program. BYTIM STARKS JUNE 6, 2024 The Federal Communications Commission voted unanimously on Thursday to advance a proposal to improve the security of a foundational routing protocol for the internet. Under the notice of proposed rulemaking on Border Gateway Protocol security, which now will go to a public comment period before final adoption, broadband internet providers would […]

read more

By Cybersecurity Safe: Lock Your Digital Door | Leon Geter | TEDxCharleston

Leon Geter’s TEDxCharleston talk, “By Cybersecurity Safe: Lock Your Digital Door,” likely emphasizes the importance of cybersecurity and provides insights on how individuals can protect themselves online. Geter may discuss common cyber threats, such as phishing and malware, and offer practical tips for safeguarding personal information and digital assets. He may also highlight the need for awareness and vigilance in today’s increasingly interconnected world. While I can’t provide specific details […]

read more

Cyber Attack Trends: Global Identity Crisis

Jeff Crume’s presentation titled “Cyber Attack Trends: Global Identity Crisis” likely delves into the current landscape of cyber attacks and their trends, particularly focusing on identity-related issues. Crume might discuss the rising threat of cyber attacks globally, highlighting how attackers exploit identity vulnerabilities to breach systems and networks. He may cover various attack techniques and tactics used by cybercriminals to compromise identities, such as phishing, social engineering, and credential theft. […]

read more

New Chrome feature aims to stop hackers from using stolen cookies

By Sergiu Gatlan: Google announced a new Chrome security feature called ‘Device Bound Session Credentials’ that ties cookies to a specific device, blocking hackers from stealing and using them to hijack users’ accounts. Cookies are files that websites use to remember your browsing information and preferences and automatically log you into a service or website. These cookies are created after you log into a service and verify multi-factor authentications, allowing […]

read more
Trustpilot
The rating of livingsafeonline.com at Trustprofile Reviews is 9.1/10 based on 13 reviews.
A note to our visitors

This website has updated its privacy policy in compliance with changes to European Union data protection law, for all members globally. We’ve also updated our Privacy Policy to give you more information about your rights and responsibilities with respect to your privacy and personal information. Please read this to review the updates about which cookies we use and what information we collect on our site. By continuing to use this site, you are agreeing to our updated privacy policy.