CISA publishes 447-page draft of cyber incident reporting rule

By-Jonathan Greig: The nation’s top cybersecurity agency has unveiled the initial draft of a new rule detailing how critical infrastructure organizations need to report cyberattacks to the federal government. The Cybersecurity and Infrastructure Security Agency (CISA) posted the 447-page set of regulations under the Cyber Incident Reporting for Critical Infrastructure Act to the Federal Register, allowing the public to comment on it. The law mandating the rules was passed in 2022 and is intended […]

read more

Vulnerability in 150K+ Fortinet Devices Let Hackers Execute Arbitary Code Remotely

By Guru Baran A critical security flaw identified as CVE-2024-21762 has been discovered in Fortinet’s FortiOS and FortiProxy secure web gateway systems, potentially impacting around 150,000 devices worldwide. The vulnerability allows for unauthenticated remote code execution (RCE) by sending specially crafted HTTP requests to the affected machines. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has confirmed that attackers actively exploit the flaw, adding it to its Known Exploited Vulnerabilities […]

read more

After collecting $22 million, AlphV ransomware group stages FBI takedown

By- DAN GOODIN The ransomware group responsible for hamstringing the prescription drug market for two weeks has suddenly gone dark, just days after receiving a $22 million payment and standing accused of scamming an affiliate out of its share of the loot.   FURTHER READING US prescription market hamstrung for 9 days (so far) by ransomware attack The events involve AlphV, a ransomware group also known as BlackCat. Two weeks […]

read more

Government hackers targeted iPhone owners with zero-days, Google says

Lorenzo Franceschi-Bicchierai@lorenzofb Government hackers last year exploited three unknown vulnerabilities in Apple’s iPhone operating system to target victims with spyware developed by a European startup, according to Google. On Tuesday, Google’s Threat Analysis Group, the company’s team that investigates nation-backed hacking, published a report analyzing several government campaigns conducted with hacking tools developed by several spyware and exploit sellers, including Barcelona-based startup Variston. In one of the campaigns, according to Google, government […]

read more

Cloud CISO Perspectives: Executive lessons from our response to Reptar

Phil Venables VP, TI Security & CISO, Google Cloud Yousif Hussin Cybersecurity expert Welcome to the second Cloud CISO Perspectives for January 2024. In this edition, I’m turning the mic over to Yousif Hussin, who as a member of Google’s Vulnerability Coordination Center led our response to the recent serious zero-day CPU vulnerability Reptar. He talks about what important lessons executives can learn from how Google responds to critical zero-day […]

read more
Trustpilot
The rating of livingsafeonline.com at Trustprofile Reviews is 9.1/10 based on 13 reviews.
A note to our visitors

This website has updated its privacy policy in compliance with changes to European Union data protection law, for all members globally. We’ve also updated our Privacy Policy to give you more information about your rights and responsibilities with respect to your privacy and personal information. Please read this to review the updates about which cookies we use and what information we collect on our site. By continuing to use this site, you are agreeing to our updated privacy policy.


Warning: syntax error, unexpected ',' in /home/u174708614/domains/livingsafeonline.com/public_html/wp-content/plugins/woocommerce-multi-currency/frontend/design.php on line 217