New Spear Phish Methodology Relies on PuTTY SSH Client to Infect SystemsIt tried to trick victims into clicking on malicious files as part of a fake...
Day: September 21, 2022
American Airlines Suffers Data Breach After Email Compromise
American Airlines Suffers Data Breach After Email CompromiseAmerican Airlines notified its clients on Friday, September 16th, that they have been the victims of a cyberattack after...
Microsoft Teams’ GIFShell Attack: What Is It and How You Can Protect Yourself from It
Microsoft Teams' GIFShell Attack: What Is It and How You Can Protect Yourself from ItOrganizations and security teams work to protect themselves from any vulnerability, and...
Emotet Botnet Started Distributing Quantum and BlackCat Ransomware
Emotet Botnet Started Distributing Quantum and BlackCat RansomwareThe Emotet malware is now being leveraged by ransomware-as-a-service (RaaS) groups, including Quantum and BlackCat, after Conti's official retirement from the...
Uber Blames Lapsus$ for Breach
Uber Blames Lapsus$ for BreachThreat actor bombarded Uber contractor with 2FA requestsLeer másThreat actor bombarded Uber contractor with 2FA requests
Rockstar Games Confirms Hacker Stole Early Grand Theft Auto VI Footage
Rockstar Games Confirms Hacker Stole Early Grand Theft Auto VI FootageAmerican video game publisher Rockstar Games on Monday revealed it was a victim of a "network...
Uber Blames LAPSUS$ Hacking Group for Recent Security Breach
Uber Blames LAPSUS$ Hacking Group for Recent Security BreachUber on Monday disclosed more details related to the security incident that happened last week, pinning the attack on a...
Russian Sandworm Hackers Impersonate Ukrainian Telecoms to Distribute Malware
Russian Sandworm Hackers Impersonate Ukrainian Telecoms to Distribute MalwareA threat cluster linked to the Russian nation-state actor tracked as Sandworm has continued its targeting of Ukraine...
FBI Lessons on Fighting Cybercrime: Three Tips on How to Improve Cybersecurity
FBI Lessons on Fighting Cybercrime: Three Tips on How to Improve CybersecurityOver 2,700 participants from 29 countries gathered for an event that was jam-packed with news about...
Revolut Breach May Have Hit 50,000+ Customers
Revolut Breach May Have Hit 50,000+ CustomersMajor phishing risk as personal details are compromisedLeer másMajor phishing risk as personal details are compromised
American Airlines Breach Exposes Customer and Staff Information
American Airlines Breach Exposes Customer and Staff InformationAn undisclosed number of people have been impactedLeer másAn undisclosed number of people have been impacted
Lapsus$ Hacking Group Allegedly Behind the Uber Security Breach
Lapsus$ Hacking Group Allegedly Behind the Uber Security BreachOn Monday, September 19, Uber posted on its blog updates about the security breach that happened on September...
Quantum Computing Already Putting Data at Risk, Cyber Pros Agree
Quantum Computing Already Putting Data at Risk, Cyber Pros AgreeIn the Deloitte poll, 50.2% of respondents said their organization is at risk of ‘harvest now, decrypt...
Hackers Admit Destroying InterContinental Hotels Group’s Data ‘For Fun’
Hackers Admit Destroying InterContinental Hotels Group's Data 'For Fun'They tried to conduct a ransomware attack against IHG and upon failing, decided to delete the dataLeer másThey...
Chinese hackers target energy sector in Australia, South China Sea
Chinese hackers target energy sector in Australia, South China SeaContenido de la entradaLeer másProofpoint News Feed
Rockstar Games Confirms GTA VI Footage Leak
Rockstar Games Confirms GTA VI Footage LeakTake-Two Interactive-owned company, Rockstar Games, confirmed on Monday that the company suffered from a network intrusion, where an illegal third...
Grand Theft Auto Publisher Rockstar Games Hacked
Grand Theft Auto Publisher Rockstar Games HackedThe threat actor ‘teapotuberhacker’ could be linked to the Lapsus$ hacking groupLeer másThe threat actor ‘teapotuberhacker’ could be linked to...
Microsoft Support Diagnostic Tool Vulnerability: What to Learn from It and How to Stay Safe
Microsoft Support Diagnostic Tool Vulnerability: What to Learn from It and How to Stay SafeBy Dirk Schrader, Resident CISO (EMEA) and VP of Security Research, Netwrix...
Mitigate Risk by Securing Third Party Software And Environments
Mitigate Risk by Securing Third Party Software And EnvironmentsSoftware Security Requires Ongoing Vigilance Against New and Evolving Vulnerabilities By Tim Kenney, Chief Operating Officer, SOOS Businesses...
Federal Progress On Zero Trust: A Report
Federal Progress On Zero Trust: A ReportFederal Agencies are Making Progress on Zero Trust but Challenges Remain By Dr. Matthew McFadden, Vice President, Cyber, […] The...
Iran-Linked APT Cozies Up to ‘Enemies’ in Trust-Based Spy Game
Iran-Linked APT Cozies Up to 'Enemies' in Trust-Based Spy GameContenido de la entradaLeer másProofpoint News Feed
Europol and Bitdefender Jointly Release LockerGoga Decryptor
Europol and Bitdefender Jointly Release LockerGoga DecryptorLockerGoga targeted several companies in Norway and across the US in 2019Leer másLockerGoga targeted several companies in Norway and across...
New Research Reveals Network Attacks at Highest Point Over the Last Three Years
New Research Reveals Network Attacks at Highest Point Over the Last Three YearsBy Corey Nachreiner, Chief Security Officer, WatchGuard Technologies Cybersecurity threats continue to grow every...
California Signs Internet Privacy Legislation to Boost Children’s Safety Online
California Signs Internet Privacy Legislation to Boost Children's Safety OnlineThe new legislation will implement some of the strictest privacy requirements in the USLeer másThe new legislation...
Heimdal® Named Expert Insights Fall 2022 “Best-Of” Winner in Four Categories
Heimdal® Named Expert Insights Fall 2022 “Best-Of” Winner in Four CategoriesCopenhagen, September 20th, 2022 – Heimdal® has been named one of the Best-Of award winners by Expert...
Omnibus Spending Bill Highlights Need for Protecting Critical Infrastructure
Omnibus Spending Bill Highlights Need for Protecting Critical InfrastructureBy Tony D’Angelo, Vice President of Public Sector, Lookout With international tensions continuing to rise, the Biden administration...
MFA Fatigue: Hackers’ new favorite tactic in high-profile breaches
MFA Fatigue: Hackers’ new favorite tactic in high-profile breachesHackers are more frequently using social engineering attacks to gain access to corporate credentials and breach large networks....
Information Warfare and What Infosec Needs to Know
Information Warfare and What Infosec Needs to KnowBy Wasim Khaled, Co-Founder and CEO, Blackbird.AI Cyberthreats are growing more sophisticated by the day, which in terms […]...
Poor Identity Management Amplifies Ransomware
Poor Identity Management Amplifies RansomwareBy David Mahdi, Chief Strategy Officer and CISO Advisor, Sectigo While ransomware is malware, security leaders must go […] The post Poor...
Critical Vulnerability in Oracle Cloud Infrastructure Allowed Unauthorized Access
Critical Vulnerability in Oracle Cloud Infrastructure Allowed Unauthorized AccessPotential attacks resulting from it may include privilege escalation and cross–tenant accessLeer másPotential attacks resulting from it may...