article thumbnail

RSAC Fireside Chat: Operationalizing diverse security to assure customers, partners–and insurers

The Last Watchdog

Related: Getting the most from cyber insurance At RSAC 2025, I met with ESET Chief Security Evangelist Tony Anscombe to trace a quiet but growing convergence: endpoint defense, cyber insurance, and monoculture risk are no longer separate concerns. When I first interviewed him in 2010, “endpoint protection” was still called antivirus.

Insurance 147
article thumbnail

GUEST ESSAY: Where we stand on mitigating software risks associated with fly-by-wire jetliners

The Last Watchdog

Here’s what you should know about the risks, what aviation is doing to address those risks, and how to overcome them. It is difficult to deny that cyberthreats are a risk to planes. Risks delineated Still, there have been many other incidents since. Fortunately, there are ways to address the risks.

Software 264
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Insecurity of WordPress and Apache Struts

Schneier on Security

Interesting data : A study that analyzed all the vulnerability disclosures between 2010 and 2019 found that around 55% of all the security bugs that have been weaponized and exploited in the wild were for two major application frameworks, namely WordPress and Apache Struts.

Risk 248
article thumbnail

Nearly a Year Later, Mozilla is Still Promoting OneRep

Krebs on Security

The ink on that partnership agreement had barely dried before KrebsOnSecurity published a story showing that Onereps Belarusian CEO and founder Dimitiri Shelest launched dozens of people-search services since 2010, including a still-active data broker called Nuwber that sells background reports on people.

article thumbnail

Ghost Ransomware a Persistent Global Threat to Critical Infrastructure

SecureWorld News

Tim Mackey, Head of Software Supply Chain Risk Strategy at Black Duck, explains: "Attacks on legacy cyber-physical, IoT, and IIoT devicesparticularly in an OT environmentare to be expected and must be planned for as part of the operational requirements for the device. For the latest updates and resources, visit StopRansomware.gov.

article thumbnail

WeLeakInfo Leaked Customer Payment Info

Krebs on Security

An exposure of 15 years worth of user data from a forum like Mazafaka is a big risk for registrants because investigators often can use common registration details to connect specific individuals who might have used multiple hacker handles over the years. That’s about when AOL sold the platform in 2010 to Russian investor DST for $187.5

Passwords 350
article thumbnail

Oil & Gas Industry Needs to Urgently Address Cybersecurity Risks

SecureWorld News

Government Accountability Office is recommending the Department of the Interior's Bureau of Safety and Environmental Enforcement (BSEE) immediately develop and implement a strategy to address offshore oil and gas infrastructure risks. Aging infrastructure, additionally, also puts operations at risk.

Risk 96