Themes from Bosch Connected World 2022: The Role of Cybersecurity in the Future of DigitalRead on for part two of my recap of Bosch Connected World,...
Month: December 2022
Mass Murderer Told Colorado Police About Stockpiled Assault Weapons for Terrorism: They Closed the Case Citing “Constitutional Right”, Which Left 5 Dead Before Military Veteran Stepped In
Mass Murderer Told Colorado Police About Stockpiled Assault Weapons for Terrorism: They Closed the Case Citing “Constitutional Right”, Which Left 5 Dead Before Military Veteran Stepped...
Flaws in MegaRAC baseband management firmware impact many server brands
Flaws in MegaRAC baseband management firmware impact many server brandsResearchers have found three vulnerabilities in AMI MegaRAC, a baseband management controller (BMC) firmware used by multiple...
Athletic shoe maker Brooks runs down cyberattacks with zero-trust segmentation
Athletic shoe maker Brooks runs down cyberattacks with zero-trust segmentationRansomware was again the top attack type in 2021, with manufacturing replacing financial services as the top...
Ransomware attack knocks Rackspace’s Exchange servers offline
Ransomware attack knocks Rackspace’s Exchange servers offlineRackspace’s hosting for Exchange servers remained offline Tuesday after an outage Friday that the company now ascribes to a ransomware...
What Airtel’s new Face Match based eKYC Verification means for India
What Airtel’s new Face Match based eKYC Verification means for IndiaAirtel’s latest initiative prioritizes digital onboarding methods to assist online customer onboarding for its payments bank...
National Pearl Harbor Remembrance Day, In Memoriam: The 2,403
National Pearl Harbor Remembrance Day, In Memoriam: The 2,403National Pearl Harbor Remembrance Day, also referred to as Pearl Harbor Remembrance Day or Pearl Harbor Day, is...
8 Mistakes to Avoid When Onboarding Your First Compliance Automation Solution
8 Mistakes to Avoid When Onboarding Your First Compliance Automation SolutionOnboarding new automated solutions is no simple task. Discover the 8 mistakes to avoid when onboarding...
Financial Services IT Teams Relying on Legacy Cybersecurity Plagued By False Positives and Negatives
Financial Services IT Teams Relying on Legacy Cybersecurity Plagued By False Positives and NegativesCybersecurity teams working in financial and banking settings face a constant struggle —...
SIM swapper sent to prison for 2FA cryptocurrency heist of over $20m
SIM swapper sent to prison for 2FA cryptocurrency heist of over $20mGuilty party got 18 months, also has to pay back $20m he probably hasn't got,...
Telcom and BPO Companies Under Attack by SIM Swapping Hackers
Telcom and BPO Companies Under Attack by SIM Swapping HackersA persistent intrusion campaign has set its eyes on telecommunications and business process outsourcing (BPO) companies at...
Darknet’s Largest Mobile Malware Marketplace Threatens Users Worldwide
Darknet's Largest Mobile Malware Marketplace Threatens Users WorldwideCybersecurity researchers have shed light on a darknet marketplace called InTheBox that's designed to specifically cater to mobile malware operators. The...
Understanding NIST CSF to assess your organization’s Ransomware readiness
Understanding NIST CSF to assess your organization's Ransomware readinessRansomware attacks keep increasing in volume and impact largely due to organizations' weak security controls. Mid-market companies are...
New Go-based Zerobot Botnet Exploiting Dozen of IoT Vulnerabilities to Expand its Network
New Go-based Zerobot Botnet Exploiting Dozen of IoT Vulnerabilities to Expand its NetworkA novel Go-based botnet called Zerobot has been observed in the wild proliferating by taking advantage...
Chinese Hackers Target Middle East Telecoms in Latest Cyber Attacks
Chinese Hackers Target Middle East Telecoms in Latest Cyber AttacksA malicious campaign targeting the Middle East is likely linked to BackdoorDiplomacy, an advanced persistent threat (APT) group...
Iranian State Hackers Targeting Key Figures in Activism, Journalism, and Politics
Iranian State Hackers Targeting Key Figures in Activism, Journalism, and PoliticsHackers with ties to the Iranian government have been linked to an ongoing social engineering and...
Microsoft Alerts Cryptocurrency Industry of Targeted Cyber Attacks
Microsoft Alerts Cryptocurrency Industry of Targeted Cyber AttacksCryptocurrency investment companies are the target of a developing threat cluster that uses Telegram groups to seek out potential...
Open Source Ransomware Toolkit Cryptonite Turns Into Accidental Wiper Malware
Open Source Ransomware Toolkit Cryptonite Turns Into Accidental Wiper MalwareA version of an open source ransomware toolkit called Cryptonite has been observed in the wild with wiper capabilities...
Data Breaches: What They Are, Why They Occur, and How to Prevent Them
Data Breaches: What They Are, Why They Occur, and How to Prevent ThemData breaches are invaluable to understanding a threat actor’s goals and motivations. Often fueled...
Meta outlines US involvement in social media disinformation in new report
Meta outlines US involvement in social media disinformation in new reportMeta outlines US involvement in social media disinformation in new report A report released by Meta’s...
Apple’s “imprecise” Blue Circle on Map Used by Police to Violently Target and Abuse Innocent Retired Woman
Apple’s “imprecise” Blue Circle on Map Used by Police to Violently Target and Abuse Innocent Retired WomanAn iPhone owner sent the asset protection forces of America...
Dissecting the cyber incident at All India Institute of Medical Sciences (AIIMS)
Dissecting the cyber incident at All India Institute of Medical Sciences (AIIMS) The news of the All India Institute of Medical Sciences (AIIMS) servers being breached is...
Decentralized Cyber security – An Advanced Approach
Decentralized Cyber security – An Advanced ApproachINTRODUCTION Security is getting harder to centralize as the nature of remote work changes and more businesses abandon the physical...
International police operation takes down iSpoof
International police operation takes down iSpoof Last week, an international group of law enforcement agencies took down one of the biggest criminal operators of a spoofing-as-a-service...
Meta outlines US involvement in social media disinformation in new report
Meta outlines US involvement in social media disinformation in new reportA report released by Meta’s security team describes the company’s shutdown of a network of Facebook...
Palo Alto Networks looks to shore up healthcare IoT security
Palo Alto Networks looks to shore up healthcare IoT securityPalo Alto Networks today rolled out a new Medical IoT Security offering, designed to provide improved visibility,...
Prolific Chinese Hackers Stole US COVID funds
Prolific Chinese Hackers Stole US COVID fundsSecret Service says discovery may be the tip of the icebergLeer másSecret Service says discovery may be the tip of...
Russian Hackers Use Western Networks to Attack Ukraine
Russian Hackers Use Western Networks to Attack UkraineLupovis used decoys to find out more about threat actorsLeer másLupovis used decoys to find out more about threat...
Crook sentenced to 18 months for stealing $20M in SIM swapping attack
Crook sentenced to 18 months for stealing $20M in SIM swapping attackNicholas Truglia, from Florida, US, was sentenced to 18 months in prison for stealing more...
FreeBSD Systems Exposed to Compromise Due to Ping Vulnerability
FreeBSD Systems Exposed to Compromise Due to Ping VulnerabilityThe creators of the FreeBSD operating system have released updates meant to resolve a vulnerability within the ping...

