When blaming the user for a security breach is unfair – or just wrongIn his career in IT security leadership, Aaron de Montmorency has seen a...
Day: December 5, 2022
API Vulnerabilities: What Are These and How to Protect your Business Against Them
API Vulnerabilities: What Are These and How to Protect your Business Against ThemApplication programming interfaces (APIs) are software intermediaries that allow different programs to communicate efficiently with...
Digital Giant ABB to Pay $315m in Bribery Case
Digital Giant ABB to Pay $315m in Bribery CaseFirm pleads guilty in major South Africa conspiracyLeer másFirm pleads guilty in major South Africa conspiracy
Manufacturers Struggle to Manage Cyber-Threats from New Tech Deployments
Manufacturers Struggle to Manage Cyber-Threats from New Tech Deployments42% of UK manufacturers have been a victim of cybercrime in the past 12 months, according to new...
Google Releases Chrome Emergency Fix For Ninth Zero-Day This Year
Google Releases Chrome Emergency Fix For Ninth Zero-Day This YearThe flaw relates to a type confusion bug in the V8 JavaScript engineLeer másThe flaw relates to...
What Is Digital Forensics and Incident Response (DFIR)?
What Is Digital Forensics and Incident Response (DFIR)?Digital Forensics and Incident Response (DFIR) is an aspect of cybersecurity focused on identifying, investigating, and fixing cyberattacks. Digital forensics...
Cyber Extortion Growing Exponentially in Africa, Middle East and China, Finds Orange
Cyber Extortion Growing Exponentially in Africa, Middle East and China, Finds OrangeBusinesses are getting better at preventing cyber incidents, Orange Cybedefense’s head of Security Research Center...
‘Team Mysterious Bangladesh’ Hackers Target Indian Education Entity
'Team Mysterious Bangladesh' Hackers Target Indian Education EntityThe hackers allegedly stole PII, including names, Aadhar numbers and IFSC codesLeer másThe hackers allegedly stole PII, including names,...
Rackspace Restores Systems After Security Incident
Rackspace Restores Systems After Security IncidentThe known impact was isolated to a portion of the firm's Hosted Exchange platformLeer másThe known impact was isolated to a...
Data Breaches in Australia Will Now Result in Fines of Up to AU$50 Million
Data Breaches in Australia Will Now Result in Fines of Up to AU$50 MillionThe Australian Parliament approved Government’s privacy penalty bill: the maximum fine for companies...
A new Linux flaw can be chained with other two bugs to gain full root privileges
A new Linux flaw can be chained with other two bugs to gain full root privilegesQualys researchers demonstrated how to chain a new Linux flaw with...
Malicious Apps with Over 2 Million Installs Found on Google Play
Malicious Apps with Over 2 Million Installs Found on Google PlayMultiple apps pretending to be useful utilities and system optimizers, but hiding malware have been identified...
Google fixed the ninth actively exploited Chrome zeroday this year
Google fixed the ninth actively exploited Chrome zeroday this yearGoogle released security updates to address a new Chrome zero-day flaw, tracked as CVE-2022-4262, actively exploited in...
Lazarus Hacking Group Uses New Fake Crypto App to Spread Malware
Lazarus Hacking Group Uses New Fake Crypto App to Spread MalwareLazarus hacking group spreads malware using a fake cryptocurrency app called BloxHolder. This made-up brand pretends...
Security Affairs newsletter Round 396
Security Affairs newsletter Round 396A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from Security Affairs free for you in...
New CryWiper wiper targets Russian entities masquerading as a ransomware
New CryWiper wiper targets Russian entities masquerading as a ransomwareExperts spotted a new data wiper, dubbed CryWiper, that was employed in destructive attacks against Russian mayor’s offices...
US DHS Cyber Safety Board will review Lapsus$ gang’s operations
US DHS Cyber Safety Board will review Lapsus$ gang’s operationsUS DHS Cyber Safety Review Board will review attacks linked to the Lapsus$ extortion gang that hit...
Law enforcement agencies can extract data from thousands of cars’ infotainment systems
Law enforcement agencies can extract data from thousands of cars’ infotainment systemsLaw enforcement agencies can extract data from the infotainment systems of thousands of different car...
Lazarus APT uses fake cryptocurrency apps to spread AppleJeus Malware
Lazarus APT uses fake cryptocurrency apps to spread AppleJeus MalwareThe North Korea-linked Lazarus APT spreads fake cryptocurrency apps under the fake brand BloxHolder to install the...
Critical Ping bug potentially allows remote hack of FreeBSD systems
Critical Ping bug potentially allows remote hack of FreeBSD systemsA critical stack-based buffer overflow bug, tracked as CVE-2022-23093, in the ping service can allow to take over FreeBSD...
Phishing Attack Strikes Apple Users During Black Friday Sales
Phishing Attack Strikes Apple Users During Black Friday SalesApple users were the target of a phishing attack that used social engineering last month, during Black Friday,...
French hospital cancels operations after a ransomware attack
French hospital cancels operations after a ransomware attackA French hospital near Paris canceled operations and transfer some patients due to a cyber attack suffered over the...
Exclusive: The largest mobile malware marketplace identified by Resecurity in the Dark Web
Exclusive: The largest mobile malware marketplace identified by Resecurity in the Dark WebResecurity has identified a new underground marketplace in the Dark Web oriented towards mobile malware developers...
Separation of Privilege (SoP) 101: Definition and Best Practices
Separation of Privilege (SoP) 101: Definition and Best PracticesA system’s security should be effective enough to protect against potential attacks. If the software is partitioned into...
Weekly Update 324
Weekly Update 324We're in Copenhagen! Scott and family joined us in Oslo for round 2 of wedding celebrations this week before jumping on the ferry to...
Russia Hacked: ‘Wiper’ Attacks Spread Across Country as New Ransomware
Russia Hacked: ‘Wiper’ Attacks Spread Across Country as New RansomwareCybersecurity researchers warns that a new data-wiping trojan has hijacked judicial courts and mayoral offices in Russia....
A New Malware Exploits A Critical Vulnerability on Redis Servers
A New Malware Exploits A Critical Vulnerability on Redis ServersTo gain control of infected systems and, likely, to construct a botnet network, a new Go-based malware...
New SiriusXM Vulnerability Allows Hackers to Unlock and Start Connected Cars Remotely
New SiriusXM Vulnerability Allows Hackers to Unlock and Start Connected Cars RemotelyResearchers have recently discovered a security vulnerability that allows threat actors to remotely attack vehicles...
Introduction to Remote Spectrum Monitoring
Introduction to Remote Spectrum MonitoringSpectrum Monitoring for Critical Infrastructure By Brandon Malatest, Per Vices Corporation As wireless communications break its expansion banks, […] The post Introduction...
In Government, Secure Data Drives the Greater Good
In Government, Secure Data Drives the Greater GoodBy Carolyn Duby, Field CTO and Cybersecurity Lead, Cloudera Government Solutions As a key component of President Biden’s […]...