Securing your organization against phishing can cost up to $85 per emailAs phishing attacks increase, preventing them from doing damage is proving costly for organizations. Phishing-related...
Month: October 2022
With Conti gone, LockBit takes lead of the ransomware threat landscape
With Conti gone, LockBit takes lead of the ransomware threat landscapeThe number of ransomware attacks observed over the previous three months declined compared to the previous...
96% of companies report insufficient security for sensitive cloud data
96% of companies report insufficient security for sensitive cloud dataThe vast majority of organizations lack confidence in securing their data in cloud, while many companies acknowledge...
IoT security strategy from enterprises using connected devices
IoT security strategy from enterprises using connected devicesIoT devices pose significant threats to enterprises because of lack of visibility into what devices are on enterprise networks...
It’s time to prioritize SaaS security
It’s time to prioritize SaaS securityDid our focus on IaaS security come at the expense of SaaS security? Know what to guard against, especially excessive user...
When CISOs are doomed to fail, and how to improve your chances of success
When CISOs are doomed to fail, and how to improve your chances of successThere's a joke cryptographer Jon Callas likes to tell: CISO stands for Chief...
Iran’s nuclear energy agency confirms email server hacked
Iran’s nuclear energy agency confirms email server hackedThe Atomic Energy Organization of Iran on Sunday confirmed that an email server at its Bushehr Nuclear Power Plant...
Security by design vital to protecting IoT, smart cities around the world, says CEO of UK NCSC
Security by design vital to protecting IoT, smart cities around the world, says CEO of UK NCSCA secure by design approach is vital to protecting the...
Medibank Backtracks: All Customer Data Was Exposed to Hackers
Medibank Backtracks: All Customer Data Was Exposed to HackersInsurer’s incident response processes under fireLeer másInsurer’s incident response processes under fire
Blockchain security companies tackle cryptocurrency theft, ransom tracing
Blockchain security companies tackle cryptocurrency theft, ransom tracingAccording to data from the Rekt leaderboard, cybercriminals have stolen as much as $3 billion of investor funds through...
GitHub Bug Exposed Repositories to Hijacking
GitHub Bug Exposed Repositories to HijackingCheckmarx warns over 10,000 popular packages could be vulnerableLeer másCheckmarx warns over 10,000 popular packages could be vulnerable
Thomson Reuters Leaks at Least 3TB of Personal Data
Thomson Reuters Leaks at Least 3TB of Personal DataThomson Reuters, a multinational media conglomerate, left at least three of its databases open which resulted in the...
White House Launches Chemical Sector Security Sprint
White House Launches Chemical Sector Security SprintBid to improve critical national infrastructure continuesLeer másBid to improve critical national infrastructure continues
8 hallmarks of a proactive security strategy
8 hallmarks of a proactive security strategyCISOs have long been tasked with building response and recovery capabilities, the objective being to have teams that can react...
Feds accuse Ukrainian of renting out PC-raiding Raccoon malware to fiends
Feds accuse Ukrainian of renting out PC-raiding Raccoon malware to fiendsSeparately, charges slapped on alleged operator of dark market, The Real Deal Mark Sokolovsky, 26, a...
US Education Sector Attacked by Vice Society Ransomware
US Education Sector Attacked by Vice Society RansomwareThe US has recently been confronted with a threat actor named ‘Vice Society’, which has been using ransomware and...
LinkedIn Unveils New Security Features to Tackle Fraud
LinkedIn Unveils New Security Features to Tackle FraudThe social media company made the announcement in a blog post on TuesdayLeer másThe social media company made the...
Akamai to boost network-layer DDoS protection with new scrubbing centers
Akamai to boost network-layer DDoS protection with new scrubbing centersContent delivery network (CDN) provider Akamai said Tuesday that its Prolexic DDoS protection service will become able...
What Is Federated Identity?
What Is Federated Identity?In information technology, federated identity refers to a method for connecting an individual’s digital identity and characteristics across numerous distinct identity management systems....
iOS Bluetooth Bug Allowed Apps to Eavesdrop on User Conversations
iOS Bluetooth Bug Allowed Apps to Eavesdrop on User ConversationsIt affected all Apple devices, including Macs, iPhone, iPad, Apple Watch, and Apple TVLeer másIt affected all...
Cybercriminals Used Two PoS Malware to Steal Details of Over 167,000 Credit Cards
Cybercriminals Used Two PoS Malware to Steal Details of Over 167,000 Credit CardsTwo point-of-sale (PoS) malware variants have been put to use by a threat actor...
Microsoft Event Log vulnerabilities threaten some Windows operating systems
Microsoft Event Log vulnerabilities threaten some Windows operating systemsA pair of newly discovered vulnerabilities have highlighted the ongoing risks posed by Internet Explorer’s (IE) deep integration...
How the Software Supply Chain Security is Threatened by Hackers
How the Software Supply Chain Security is Threatened by HackersIntroduction In many ways, the software supply chain is similar to that of manufactured goods, which we...
New York Post Website and Twitter Account Hacked
New York Post Website and Twitter Account HackedThe American news outlet New York Post confirmed today that it was hacked after threat actors used their website...
Kiss-a-Dog Cryptojacking Campaign Targets Docker and Kubernetes
Kiss-a-Dog Cryptojacking Campaign Targets Docker and KubernetesThe threat actors also utilized user and kernel mode rootkits to hide the activityLeer másThe threat actors also utilized user...
Researchers Detail Windows Event Log Vulnerabilities: LogCrusher and OverLog
Researchers Detail Windows Event Log Vulnerabilities: LogCrusher and OverLogCybersecurity researchers have disclosed details about a pair of vulnerabilities in Microsoft Windows, one of which could be...
Hive Ransomware Hackers Begin Leaking Data Stolen from Tata Power Energy Company
Hive Ransomware Hackers Begin Leaking Data Stolen from Tata Power Energy CompanyThe Hive ransomware-as-a-service (RaaS) group has claimed responsibility for a cyber attack against Tata Power that was...
22-Year-Old Vulnerability Reported in Widely Used SQLite Database Library
22-Year-Old Vulnerability Reported in Widely Used SQLite Database LibraryA high-severity vulnerability has been disclosed in the SQLite database library, which was introduced as part of a...
VMware Releases Patch for Critical RCE Flaw in Cloud Foundation Platform
VMware Releases Patch for Critical RCE Flaw in Cloud Foundation PlatformVMware on Tuesday shipped security updates to address a critical security flaw in its VMware Cloud...
Hackers Actively Exploiting Cisco AnyConnect and GIGABYTE Drivers Vulnerabilities
Hackers Actively Exploiting Cisco AnyConnect and GIGABYTE Drivers VulnerabilitiesCisco has warned of active exploitation attempts targeting a pair of two-year-old security flaws in the Cisco AnyConnect...