DEADBOLT ransomware rears its head again, attacks QNAP devicesNAS devices make it easy for anyone to add high-capacity file servers to their network. Guess why cybercrooks...
Day: September 7, 2022
Channel 4 optimizes cybersecurity and boosts efficiency after partnering with Invicti
Channel 4 optimizes cybersecurity and boosts efficiency after partnering with InvictiUsing Invicti for vulnerability scanning has allowed Channel 4 to improve security while also spending less...
What Is Your Security Team Profile? Prevention, Detection, or Risk Management
What Is Your Security Team Profile? Prevention, Detection, or Risk ManagementNot all security teams are born equal. Each organization has a different objective. In cybersecurity, adopting...
TikTok Denies Data Breach Reportedly Exposing Over 2 Billion Users’ Information
TikTok Denies Data Breach Reportedly Exposing Over 2 Billion Users' InformationPopular short-form social video service TikTok denied reports that it was breached by a hacking group,...
QNAP Warns of New DeadBolt Ransomware Attacks Exploiting Photo Station Flaw
QNAP Warns of New DeadBolt Ransomware Attacks Exploiting Photo Station FlawQNAP has issued a new advisory urging users of its network-attached storage (NAS) devices to upgrade...
New EvilProxy Phishing Service Allowing Cybercriminals to Bypass 2-Factor Security
New EvilProxy Phishing Service Allowing Cybercriminals to Bypass 2-Factor SecurityA new phishing-as-a-service (PhaaS) toolkit dubbed EvilProxy is being advertised on the criminal underground as a means...
Researchers Find New Android Spyware Campaign Targeting Uyghur Community
Researchers Find New Android Spyware Campaign Targeting Uyghur CommunityA previously undocumented strain of Android spyware with extensive information gathering capabilities has been found disguised as a...
Integrating Live Patching in SecDevOps Workflows
Integrating Live Patching in SecDevOps WorkflowsSecDevOps is, just like DevOps, a transformational change that organizations undergo at some point during their lifetime. Just like many other...
Worok Hackers Target High-Profile Asian Companies and Governments
Worok Hackers Target High-Profile Asian Companies and GovernmentsHigh-profile companies and local governments located primarily in Asia are the subjects of targeted attacks by a previously undocumented...
TA505 Hackers Using TeslaGun Panel to Manage ServHelper Backdoor Attacks
TA505 Hackers Using TeslaGun Panel to Manage ServHelper Backdoor AttacksCybersecurity researchers have offered fresh insight into a previously undocumented software control panel used by a financially...
Nadine Dorries promotes ‘Brexit rewards’ of proposed UK data protection law
Nadine Dorries promotes 'Brexit rewards' of proposed UK data protection lawCulture secretary talks up pre-Commons reading as UK waits to hear who new leader will be...
Mirai Variant MooBot Botnet Exploiting D-Link Router Vulnerabilities
Mirai Variant MooBot Botnet Exploiting D-Link Router VulnerabilitiesA variant of the Mirai botnet known as MooBot is co-opting vulnerable D-Link devices into an army of denial-of-service...
Critical RCE Vulnerability Affects Zyxel NAS Devices — Firmware Patch Released
Critical RCE Vulnerability Affects Zyxel NAS Devices — Firmware Patch ReleasedNetworking equipment maker Zyxel has released patches for a critical security flaw impacting its network-attached storage...
New Stealthy Shikitega Malware Targeting Linux Systems and IoT Devices
New Stealthy Shikitega Malware Targeting Linux Systems and IoT DevicesA new piece of stealthy Linux malware called Shikitega has been uncovered adopting a multi-stage infection chain...
North Korean Hackers Deploying New MagicRAT Malware in Targeted Campaigns
North Korean Hackers Deploying New MagicRAT Malware in Targeted CampaignsThe prolific North Korean nation-state actor known as the Lazarus Group has been linked to a new...
4 Key Takeaways from “XDR is the Perfect Solution for SMEs” webinar
4 Key Takeaways from "XDR is the Perfect Solution for SMEs" webinarCyberattacks on large organizations dominate news headlines. So, you may be surprised to learn that...
Some Members of Conti Group Targeting Ukraine in Financially Motivated Attacks
Some Members of Conti Group Targeting Ukraine in Financially Motivated AttacksFormer members of the Conti cybercrime cartel have been implicated in five different campaigns targeting Ukraine...
Authorities Shut Down WT1SHOP Site for Selling Stolen Credentials and Credit Cards
Authorities Shut Down WT1SHOP Site for Selling Stolen Credentials and Credit CardsAn international law enforcement operation has resulted in the dismantling of WT1SHOP, an online criminal marketplace...
Unhappy about excluding nation-state attacks from cyberinsurance? Get ready to pay
Unhappy about excluding nation-state attacks from cyberinsurance? Get ready to payLloyd's defends stance as critics say policy tweaks make it less worthwhile to spend on premiums...
Newly discovered cyberspy crew targets Asian governments and corporations
Newly discovered cyberspy crew targets Asian governments and corporationsWorok uses mix of publicly available tools, custom malware to steal info, gang active since 2020 A cyberespionage...
Top 5 Zero-Day Vulnerabilities of August
Top 5 Zero-Day Vulnerabilities of AugustZero day vulnerabilities and exploits are unexpected, hence zero-day protection is required. Here are some suggestions for preventing zero-day attacks on...
Game-Related Cyber-Threats: Almost 100k Malicious Files Last Year
Game-Related Cyber-Threats: Almost 100k Malicious Files Last YearKaspersky also observed an increase in the number of programs that can steal secretsLeer másKaspersky also observed an increase...
Ransomware gang hits second-largest US school district
Ransomware gang hits second-largest US school districtFBI and CISA on-site to assist with incident response over Labor Day weekend Updated Cybercriminals hit the Los Angeles Unified...
Password Reuse is Putting MSP’s at Risk
Password Reuse is Putting MSP’s at RiskPassword hygiene is a huge priority for Managed Service Providers Every organization is at risk for cyber attack, but MSPs...
Google Vulnerability Reward Program Focuses on Open Source Software
Google Vulnerability Reward Program Focuses on Open Source Software Google’s bug bounty program will be expanded to include a special open source section called the Open...
Cyberattack brings down InterContinental Hotels’ booking systems
Cyberattack brings down InterContinental Hotels' booking systemsOnline booking systems and other services knocked offline amid network intrusion The IT systems of InterContinental Hotels Group, the massive...
BlackCat Ransomware Linked to Italy’s Energy Services Firm Hack
BlackCat Ransomware Linked to Italy's Energy Services Firm HackThe ransomware group claimed to have downloaded 700GB of data from GSELeer másThe ransomware group claimed to have...
The Mayhem for API Difference – A ZAP – API Scan Comparison
The Mayhem for API Difference – A ZAP – API Scan ComparisonWith the rapid development of modern web APIs, developers must balance quality, reliability, and security...
Go programming language arrives at security warnings that are useful
Go programming language arrives at security warnings that are usefulLow-noise tool hopes to highlight vulnerabilities imported into projects The open source Go programming language, developed by...
Using Backups to Turn the Tables on Ransomware
Using Backups to Turn the Tables on Ransomware When an enterprise gets hit with ransomware, the fundamental question is whether the cost of downtime is greater...