Netizen Blog and News
The Netizen team sharing expertise, insights and useful information in cybersecurity, compliance, and software assurance.
recent posts
- Instructure Confirms Canvas Data Exposure After ShinyHunters Claims Breach
- What Security Teams Are Seeing in AI-Generated Code
- VECT Ransomware Shows How New RaaS Operations Are Trying to Scale
- Netizen: Monday Security Brief (5/4/2026)
- SIEM Requirements for CMMC 2.0: What Federal Contractors Need to Implement
about
Category: Privacy
-

As technology advances, so do both cyberattacks and cybersecurity, both are constantly evolving in order to surpass the other. As new, cutting edge technology develops, like quantum computing, network defenders have a substantial problem on their hands, as quantum decryption could be a powerful tool for attackers. While it’s a thrilling shift with the promise…
-
Overview: Phish Tale of the Week Often times phishing campaigns, created by malicious actors, target users by utilizing social engineering. For example, in this email, the actors are appearing as LastPass, the password manager company, and informing you that action needs to be taken on your account in order to avoid deactivation, in this case…
-

38 Terabytes. That’s the amount of storage it takes to store 7600 hours of HD video, enough to watch for 316 days without repeating anything. It’s also the amount of private company data that Microsoft AI researchers accidentally exposed, including over 30,000 internal Teams messages, according to cloud security company Wiz. The Microsoft Azure Leak…
-

MGM Resorts is currently scrambling to recover from a powerful ransomware attack that happened last Monday, causing a substantial amount of network systems to go down. Company websites as well as many crucial systems are currently offline, including the MGM app, which facilitates reservations, acts as a digital key to unlock rooms, and allows users…
-

With the popularization of generative AI tools like ChatGPT, information has become increasingly easy to retrieve. Ask it anything, and ChatGPT will respond to the best of its ability, modifying itself to your prompt’s specifications as best it can. The more detailed the prompt, the more specific of a response you can get from an…
-

A new cyberattack campaign named “DB#JAMMER” has emerged, specifically targeting exposed Microsoft SQL Server (MSSQL) databases. The implications of this campaign are nothing short of severe, especially for organizations relying on this technology, as DB#JAMMER is no ordinary cyberattack; it’s a well-choreographed assault that employs intricate tactics, including relentless brute-force attacks aimed at breaching MSSQL…
-

Security researchers from Cyfirma recently discovered that over 80,000 Hikvision surveillance cameras are still susceptible to a critical vulnerability that was patched in a security update over 2 years ago. CVE-2021-36260, which was added to the National Vulnerability Database in January of 2022, allows attackers to exploit Hikvision cameras due to their lack of input…
-

Artificial intelligence is being incorporated into a range of cyber security products, but the technology may also introduce new threats, a report warns Artificial intelligence (AI) poses a range of threats to cyber, physical and political security, according to a report by 26 UK and US experts and researchers. The Malicious use of artificial intelligence report examines the…
-

Researchers find a telling relationship between who gives online privacy and cybersecurity advice and the number of internet-based security incidents experienced by the recipient of the advice. Advice on the internet flows freely. With so much information available, how does one know what to believe? For example, there is still significant confusion regarding the now…
-

Faced with a growing shortage of workers, the cybersecurity industry needs to figure out how to attract a new wave of talent. Nearly one third of organizations are not able to fill their cybersecurity positions, according to a recent survey by the cybersecurity nonprofit ISACA. For another 25 percent, the process takes six months. The…