Uber links cyberattack to LAPSUS$, says sensitive user data remains protectedUber has linked its recent cyberattack to an actor (or actors) affiliated with the notorious LAPSUS$...
Month: September 2022
Uber’s hacker *irritated* his way into its network, stole internal documents
Uber’s hacker *irritated* his way into its network, stole internal documentsUber has suffered a security breach which allowed a hacker to break into its network, and...
Two-Fifths of US Consumers Suffer Personal Data Theft
Two-Fifths of US Consumers Suffer Personal Data TheftThose suffering emotional and physical impact surgesLeer másThose suffering emotional and physical impact surges
The Risk of Ransomware Supply Chain Attacks
The Risk of Ransomware Supply Chain AttacksOver the years, ransomware has become a major threat and it can put supply chains in deep trouble.Leer másTrend Micro...
SEC fines Morgan Stanley Smith Barney $35 million over failure to secure customer data
SEC fines Morgan Stanley Smith Barney $35 million over failure to secure customer dataThe financial giant hired a moving company with no experience in data destruction...
Multiple Vulnerabilities Discovered in Dataprobe’s iBoot-PDUs
Multiple Vulnerabilities Discovered in Dataprobe's iBoot-PDUsThey pose a number of risks to Dataprobe, including giving control of the iBoot-PDU to attackersLeer másThey pose a number of...
Palo Alto adds software composition analysis to Prisma Cloud to boost open-source security
Palo Alto adds software composition analysis to Prisma Cloud to boost open-source securityPalo Alto Networks has added a new software composition analysis (SCA) solution to Prisma...
IT giants warn of ongoing Chromeloader malware campaigns
IT giants warn of ongoing Chromeloader malware campaignsVMware and Microsoft are warning of a widespread Chromeloader malware campaign that distributes several malware families. ChromeLoader is a...
CrowdStrike adds XDR, other capabilites across 4 key security products
CrowdStrike adds XDR, other capabilites across 4 key security productsCrowdStrike on Tuesday announced enhancements to four of its security products–Falcon Insight, CrowdStrike Cloud Security, Humio, and...
Use-after-freedom: MiraclePtr
Use-after-freedom: MiraclePtr Posted by Adrian Taylor, Bartek Nowierski and Kentaro Hara on behalf of the MiraclePtr team Memory safety bugs are the most numerous category of...
American Airlines disclosed a data breach
American Airlines disclosed a data breachAmerican Airlines disclosed a data breach, threat actors had access to an undisclosed number of employee email accounts. American Airlines recently suffered a...
Atlassian Confluence Vulnerability CVE-2022-26134 Abused For Cryptocurrency Mining, Other Malware
Atlassian Confluence Vulnerability CVE-2022-26134 Abused For Cryptocurrency Mining, Other MalwareUsers are advised to patch immediately: We found exploit samples abusing the Atlassian Confluence vulnerability (CVE-2022-26134) in...
NCSC: British Retailers Need to Move Beyond Passwords
NCSC: British Retailers Need to Move Beyond PasswordsThe UK’s national cybersecurity agency also advised organizations on what steps they should take if their brand has been...
Analyzing IP Addresses to Prevent Fraud for Enterprises
Analyzing IP Addresses to Prevent Fraud for EnterprisesHow can businesses protect themselves from fraudulent activities by examining IP addresses? The police would track burglars if they...
Botched Crypto Mugging Lands Three U.K. Men in Jail
Botched Crypto Mugging Lands Three U.K. Men in JailThree men in the United Kingdom were arrested this month for attempting to assault a local man and...
Uber believes that the LAPSUS$ gang is behind the recent attack
Uber believes that the LAPSUS$ gang is behind the recent attackUber disclosed additional details about the security breach, the company blames a threat actor allegedly affiliated...
SIM Swapper Abducted, Beaten, Held for $200k Ransom
SIM Swapper Abducted, Beaten, Held for $200k RansomA Florida teenager who served as a lackey for a cybercriminal group that specializes in cryptocurrency thefts was beaten...
Russian Sandworm APT impersonates Ukrainian telcos to deliver malware
Russian Sandworm APT impersonates Ukrainian telcos to deliver malwareRussia-linked APT group Sandworm has been observed impersonating telecommunication providers to target Ukrainian entities with malware. Russia-linked cyberespionage...
Imperva blocked a record DDoS attack with 25.3 billion requests
Imperva blocked a record DDoS attack with 25.3 billion requestsCybersecurity company Imperva announced to have mitigated a distributed denial-of-service (DDoS) attack with a total of over...
350K Open-Source Projects At Risk of Supply Chain Vulnerability
350K Open-Source Projects At Risk of Supply Chain VulnerabilityThe flaw resides in the tarfile module, automatically installed in any Python projectLeer másThe flaw resides in the...
Ransomware is (slightly) on the decline, cyberinsurance company says
Ransomware is (slightly) on the decline, cyberinsurance company saysRansomware attacks began to become both less common and less costly in the first half of 2022, as...
Microsoft Upgrades Windows 11 With New Security Features
Microsoft Upgrades Windows 11 With New Security FeaturesThe list includes application control enhancements and vulnerable drivers protection, among othersLeer másThe list includes application control enhancements and...
Automatic Cheating Detection in Human Racing
Automatic Cheating Detection in Human RacingThis is a fascinating glimpse of the future of automatic cheating detection in sports: Maybe you heard about the truly insane...
U.S. gov adds more Chinese Telecom firms to the Covered List
U.S. gov adds more Chinese Telecom firms to the Covered ListThe U.S. Federal Communications Commission (FCC) has added more Chinese telecom firms to the Covered List....
Hackers stole $160 Million from Crypto market maker Wintermute
Hackers stole $160 Million from Crypto market maker WintermuteThreat actors have stolen around $160 million worth of digital assets worth from crypto trading firm Wintermute. Malicious actors...
Iranian Hackers Hid in Albanian Networks for Over a Year
Iranian Hackers Hid in Albanian Networks for Over a YearCISA report reveals extent of state-backed campaignLeer másCISA report reveals extent of state-backed campaign
Top 5 attack surface challenges related to security operations
Top 5 attack surface challenges related to security operationsAccording to newly published ESG research, just over half of all organizations (52%) say that security operations are...
Over 39K unauthenticated Redis services on the internet targeted in cryptocurrency campaign
Over 39K unauthenticated Redis services on the internet targeted in cryptocurrency campaignThreat actors targeted tens thousands of unauthenticated Redis servers exposed on the internet as part...
Why is my Wi‑Fi slow and how do I make it faster?
Why is my Wi‑Fi slow and how do I make it faster?Has your Wi-Fi speed slowed down to a crawl? Here are some of the possible...
A disgruntled developer is the alleged source of the leak of the Lockbit 3.0 builder
A disgruntled developer is the alleged source of the leak of the Lockbit 3.0 builderA disgruntled developer seems to be responsible for the leak of the...


























