'

Amazon’s AWS Control Tower aims to help secure your data’s borders

Amazon’s AWS Control Tower aims to help secure your data’s borders

Amazon’s AWS Control Tower system, designed to let users more easily manage complicated cloud environments with multiple accounts and wide arrays of services, now has 65 new controls and rule sets aimed at managing digital sovereignty concerns. The new controls, which the company announced in a blog post on Monday during its week-long re:Invent conference, … Read more

ID Theft Service Resold Access to USInfoSearch Data

ID Theft Service Resold Access to USInfoSearch Data

One of the cybercrime underground’s more active sellers of Social Security numbers, background and credit reports has been pulling data from hacked accounts at the U.S. consumer data broker USinfoSearch, KrebsOnSecurity has learned. Since at least February 2023, a service advertised on Telegram called USiSLookups has operated an automated bot that allows anyone to look … Read more

North Korean hackers mix code from proven malware campaigns to avoid detection

North Korean hackers mix code from proven malware campaigns to avoid detection

North Korean threat actors behind two major macOS-targeting malware strains of 2023 — RustBucket and KandyKorn — have been found mixing the elements of these disparate attacks to evade detection, according to a SentinelOne study. The new technique leverages the RustBucket dropper, SwiftLoader, to deliver the KandyKorn remote access trojan (RAT) payload. “We provide the … Read more

How a digital design firm navigated its SOC 2 audit

How a digital design firm navigated its SOC 2 audit

In today’s rapidly evolving digital landscape, artificial intelligence (AI) is a driving force behind innovation. However, AI’s true potential hinges not only on technological prowess but also on the insight and foresight of designers and strategists. These professionals ensure that AI advancements are groundbreaking and safeguard our societal fabric. As a co-founder of a company … Read more