Car dealer group Pendragon refuses to pay $60 million to ransomware extortionistsPendragon - the car dealership group which owns Evans Halshaw, CarStore, and Stratstone, and operates...
Month: October 2022
Using Identity for Access Is a Huge Cybersecurity Risk
Using Identity for Access Is a Huge Cybersecurity RiskWhy FIDO’s proposal to use identification for cyber access opens more security vulnerabilities for threat actors to exploit...
Upcoming Speaking Engagements
Upcoming Speaking EngagementsThis is a current list of where and when I am scheduled to speak: I’m speaking at the World Ethical Data Forum, online, October...
Friday Squid Blogging: On Squid Ink
Friday Squid Blogging: On Squid InkIt’s aimed at children, but it’s a good primer. As usual, you can also use this squid post to talk about...
Seven months after it found out, FamilySearch tells users their personal data has been breached
Seven months after it found out, FamilySearch tells users their personal data has been breachedShouldn't affected users have been told sooner?Leer másGraham CluleyShouldn't affected users have...
Hacking Automobile Keyless Entry Systems
Hacking Automobile Keyless Entry SystemsSuspected members of a European car-theft ring have been arrested: The criminals targeted vehicles with keyless entry and start systems, exploiting the...
Automotive Retailer Pendragon Refuses to Pay $60 Million Ransom
Automotive Retailer Pendragon Refuses to Pay $60 Million RansomLockBit ransomware allegedly breached Pendragon Group, a U.K.-based auto dealer group with over 200 locations, and demanded $60...
Black Basta Ransomware Gang Infiltrates Networks via QAKBOT, Brute Ratel, and Cobalt Strike
Black Basta Ransomware Gang Infiltrates Networks via QAKBOT, Brute Ratel, and Cobalt StrikeWe analyzed a QAKBOT-related case leading to a Brute Ratel C4 and Cobalt Strike...
Qatar Spyware
Qatar SpywareEveryone visiting Qatar for the World Cup needs to install spyware on their phone. Everyone travelling to Qatar during the football World Cup will be...
RomCom Backdoor Detection: Cyber Attack on Ukrainian State Bodies Attributed to Cuba Ransomware Operators aka Tropical Scorpius (UNC2596) Group
RomCom Backdoor Detection: Cyber Attack on Ukrainian State Bodies Attributed to Cuba Ransomware Operators aka Tropical Scorpius (UNC2596) Group In May 2022, Cuba ransomware maintainers resurfaced...
Museum Security
Museum SecurityInteresting interview: Banks don’t take millions of dollars and put them in plastic bags and hang them on the wall so everybody can walk right...
Online Tracking Tools Provoke Patient Privacy Concerns
Online Tracking Tools Provoke Patient Privacy ConcernsA study by data privacy firm Lokker found thousands of healthcare providers deploying Facebook Pixel and other similar tracking tools....
Oil and Gas Cybersecurity: Trends & Response to Survey
Oil and Gas Cybersecurity: Trends & Response to SurveyBased on our survey of over 900 ICS security leaders in the United States, Germany, and Japan, we...
Interview with Signal’s New President
Interview with Signal’s New PresidentLong and interesting interview with Signal’s new president, Meredith Whittaker: WhatsApp uses the Signal encryption protocol to provide encryption for its messages....
Cybersecurity event cancelled after scammers disrupt LinkedIn live chat
Cybersecurity event cancelled after scammers disrupt LinkedIn live chatIt was all going so well. At first. Read more in my article on the Hot for Security...
Adversarial ML Attack that Secretly Gives a Language Model a Point of View
Adversarial ML Attack that Secretly Gives a Language Model a Point of ViewMachine learning security is extraordinarily difficult because the attacks are so varied—and it seems...
Attack Surface Management 2022 Midyear Review Part 1
Attack Surface Management 2022 Midyear Review Part 1In our 2022 midyear roundup, we examine the most significant trends and incidents that influenced the cybersecurity landscape in...
Battle with Bots Prompts Mass Purge of Amazon, Apple Employee Accounts on LinkedIn
Battle with Bots Prompts Mass Purge of Amazon, Apple Employee Accounts on LinkedInOn October 10, 2022, there were 576,562 LinkedIn accounts that listed their current employer...
Friday Squid Blogging: The Reproductive Habits of Giant Squid
Friday Squid Blogging: The Reproductive Habits of Giant SquidInteresting: A recent study on giant squid that have washed ashore along the Sea of Japan coast has...
Most Concerning Security Vulnerabilities in Medical Devices
Most Concerning Security Vulnerabilities in Medical DevicesSecurity flaws in a vital signs monitoring device from a China-based manufacturer could allow hackers to launch an attack that...
Uncovering Security Blind Spots in CNC Machines
Uncovering Security Blind Spots in CNC MachinesIndustry 4.0 has given rise to smart factories that have markedly improved machining processes, but it has also opened the...
On the Randomness of Automatic Card Shufflers
On the Randomness of Automatic Card ShufflersMany years ago, Matt Blaze and I talked about getting our hands on a casino-grade automatic shuffler and looking for...
Russian-Speaking Ransomware Gangs Hit New Victim: Russians
Russian-Speaking Ransomware Gangs Hit New Victim: RussiansThe latest edition of the ISMG Security Report discusses how Russian-speaking ransomware gangs have their eyes on a new target,...
LV Ransomware Exploits ProxyShell in Attack on a Jordan-based Company
LV Ransomware Exploits ProxyShell in Attack on a Jordan-based CompanyOur blog entry provides a look at an attack involving the LV ransomware on a Jordan-based company...
Webinar | Why Should Modern Endpoint Protection be Cloud-Based?
Webinar | Why Should Modern Endpoint Protection be Cloud-Based?Contenido de la entradaLeer másDataBreachToday.com RSS Syndication
8 essential ways to prevent ever-infuriating keyless car theft
8 essential ways to prevent ever-infuriating keyless car theftEXECUTIVE SUMMARY: The era of hotwiring cars is long since over. Contemporary car thieves leverage exceedingly sophisticated techniques...
GUEST ESSAY: These advanced phishing tactics should put all businesses on high alert
GUEST ESSAY: These advanced phishing tactics should put all businesses on high alertPhishing attacks are nothing new, but scammers are getting savvier with their tactics. Related:...
Massive cryptomining campaign abuses free-tier cloud dev resources
Massive cryptomining campaign abuses free-tier cloud dev resourcesAn automated and large-scale 'freejacking' campaign abuses free GitHub, Heroku, and Buddy services to mine cryptocurrency at the provider's...
CISOs, Board Members and the Search for Cybersecurity Common Ground
CISOs, Board Members and the Search for Cybersecurity Common GroundContenido de la entradaLeer másProofpoint News Feed
GUEST ESSAY: Restore Us Institute (RUI) aims to protect Americans from online harms and crimes
GUEST ESSAY: Restore Us Institute (RUI) aims to protect Americans from online harms and crimesHow did America and Americans regress to being much less secure than...















