Rackspace Admits Security Incident, Helps Customers Migrate to Microsoft 365 AccountsThe known impact was isolated to a portion of the firm's Hosted Exchange platformLeer másThe known...
Day: December 7, 2022
Gen Z Internet Users “Normalize” Cybercrime – Report
Gen Z Internet Users "Normalize" Cybercrime - ReportEU-funded study finds concerning levels of risky behaviorLeer másEU-funded study finds concerning levels of risky behavior
Threat Actors Use Malicious File Systems to Scale Crypto-Mining Operations
Threat Actors Use Malicious File Systems to Scale Crypto-Mining OperationsThe hackers used PRoot to increase the scope of their operations to several Linux distributionsLeer másThe hackers...
Swiss Government Wants to Implement Mandatory Duty to Report Cyber-Attacks
Swiss Government Wants to Implement Mandatory Duty to Report Cyber-AttacksThe move would shed light on hackers and sound the alarm more widely on cyber-threats in the...
Christmas Warning: Threat Actors Impersonate your Favorite Brands to Attack, Finds CSC
Christmas Warning: Threat Actors Impersonate your Favorite Brands to Attack, Finds CSCMajority of third-party domain names impersonating the biggest global brands use domain privacy services, indicating...
China-Based Hackers Target Amnesty International Canada
China-Based Hackers Target Amnesty International CanadaResults suggest the attack was executed using tools and techniques associated with Chinese APTs.Leer másResults suggest the attack was executed using...
Supply Chain Web Skimming Attacks Hit Dozens of Sites
Supply Chain Web Skimming Attacks Hit Dozens of SitesMalicious e-commerce campaign ongoing since December 2021Leer másMalicious e-commerce campaign ongoing since December 2021
Russia’s VTB Bank Suffers its Biggest Ever DDoS
Russia's VTB Bank Suffers its Biggest Ever DDoSUkraine suspected of attack on state-owned lenderLeer másUkraine suspected of attack on state-owned lender
ICO Fines Rogue Nuisance Callers £500,000
ICO Fines Rogue Nuisance Callers £500,000Some companies forced victims to share card detailsLeer másSome companies forced victims to share card details
UK Government Department Using Unsupported Applications, Reveals Watchdog
UK Government Department Using Unsupported Applications, Reveals WatchdogAlmost a third (30%) of applications used by Defra are unsupported, a report from the National Audit Office has...
USENIX Security ’22 – Octavian Suciu, Connor Nelson, Zhuoer Lyu, Tiffany Bao, Tudor Dumitraș’ Expected Exploitability: Predicting the Development of Functional Vulnerability Exploits’
USENIX Security ’22 – Octavian Suciu, Connor Nelson, Zhuoer Lyu, Tiffany Bao, Tudor Dumitraș’ Expected Exploitability: Predicting the Development of Functional Vulnerability Exploits’Our thanks to USENIX...
GUEST ESSAY: ‘Continuous authentication’ is driving passwordless sessions into the mainstream
GUEST ESSAY: ‘Continuous authentication’ is driving passwordless sessions into the mainstreamMuch more effective authentication is needed to help protect our digital environment – and make user...
What you should know when considering cyber insurance in 2023
What you should know when considering cyber insurance in 2023As the frequency and severity of ransomware, phishing, and denial of service attacks has increased, so has...
What Is Domain Spoofing and How to Stop It
What Is Domain Spoofing and How to Stop ItDomain spoofing tricks users into visiting a malicious site. Learn about domain spoofing and how to stop them....
Lightspin announces full coverage for AWS Vortex, AWS Time Machine and 3 others services following AWS Re:Invent
Lightspin announces full coverage for AWS Vortex, AWS Time Machine and 3 others services following AWS Re:Invent Today, Lightspin is thrilled to announce that our cloud...
The changing role of the MITRE ATT@CK framework
The changing role of the MITRE ATT@CK frameworkSince its creation in 2013, the MITRE ATT&CK framework has been of interest to security operations professionals. In the...
The cybersecurity challenges and opportunities of digital twins
The cybersecurity challenges and opportunities of digital twinsDigital twins are a digital representation of objects, structures or systems that give organizations greater insight into the life...
Action1 launches threat actor filtering to block remote management platform abuse
Action1 launches threat actor filtering to block remote management platform abuseAction1 has announced new AI-based threat actor filtering to detect and block abuse of its remote...
Mass Murderer Told Colorado Police About Stockpiled Assault Weapons for Terrorism: They Closed the Case Citing “Constitutional Right”, Which Left 5 Dead Before Military Veteran Stepped In
Mass Murderer Told Colorado Police About Stockpiled Assault Weapons for Terrorism: They Closed the Case Citing “Constitutional Right”, Which Left 5 Dead Before Military Veteran Stepped...
Themes from Bosch Connected World 2022: The Role of Cybersecurity in the Future of Digital
Themes from Bosch Connected World 2022: The Role of Cybersecurity in the Future of DigitalRead on for part two of my recap of Bosch Connected World,...
Flaws in MegaRAC baseband management firmware impact many server brands
Flaws in MegaRAC baseband management firmware impact many server brandsResearchers have found three vulnerabilities in AMI MegaRAC, a baseband management controller (BMC) firmware used by multiple...
Ransomware attack knocks Rackspace’s Exchange servers offline
Ransomware attack knocks Rackspace’s Exchange servers offlineRackspace’s hosting for Exchange servers remained offline Tuesday after an outage Friday that the company now ascribes to a ransomware...
Athletic shoe maker Brooks runs down cyberattacks with zero-trust segmentation
Athletic shoe maker Brooks runs down cyberattacks with zero-trust segmentationRansomware was again the top attack type in 2021, with manufacturing replacing financial services as the top...
What Airtel’s new Face Match based eKYC Verification means for India
What Airtel’s new Face Match based eKYC Verification means for IndiaAirtel’s latest initiative prioritizes digital onboarding methods to assist online customer onboarding for its payments bank...
National Pearl Harbor Remembrance Day, In Memoriam: The 2,403
National Pearl Harbor Remembrance Day, In Memoriam: The 2,403National Pearl Harbor Remembrance Day, also referred to as Pearl Harbor Remembrance Day or Pearl Harbor Day, is...
Financial Services IT Teams Relying on Legacy Cybersecurity Plagued By False Positives and Negatives
Financial Services IT Teams Relying on Legacy Cybersecurity Plagued By False Positives and NegativesCybersecurity teams working in financial and banking settings face a constant struggle —...
8 Mistakes to Avoid When Onboarding Your First Compliance Automation Solution
8 Mistakes to Avoid When Onboarding Your First Compliance Automation SolutionOnboarding new automated solutions is no simple task. Discover the 8 mistakes to avoid when onboarding...
SIM swapper sent to prison for 2FA cryptocurrency heist of over $20m
SIM swapper sent to prison for 2FA cryptocurrency heist of over $20mGuilty party got 18 months, also has to pay back $20m he probably hasn't got,...
Telcom and BPO Companies Under Attack by SIM Swapping Hackers
Telcom and BPO Companies Under Attack by SIM Swapping HackersA persistent intrusion campaign has set its eyes on telecommunications and business process outsourcing (BPO) companies at...
Darknet’s Largest Mobile Malware Marketplace Threatens Users Worldwide
Darknet's Largest Mobile Malware Marketplace Threatens Users WorldwideCybersecurity researchers have shed light on a darknet marketplace called InTheBox that's designed to specifically cater to mobile malware operators. The...