3 Software Supply Chain Security Pitfalls and How to Avoid ThemContenido de la entradaLeer másDataBreachToday.com RSS Syndication
Month: December 2022
A Look into Cybercrime and the People Behind It with Brian Krebs
A Look into Cybercrime and the People Behind It with Brian KrebsContenido de la entradaLeer másDataBreachToday.com RSS Syndication
Live Webinar | A Master Class on Cybersecurity: Roger Grimes Teaches Password Best Practices
Live Webinar | A Master Class on Cybersecurity: Roger Grimes Teaches Password Best PracticesContenido de la entradaLeer másDataBreachToday.com RSS Syndication
LIVE Webinar | Native Database Protection Is Not Enough
LIVE Webinar | Native Database Protection Is Not EnoughContenido de la entradaLeer másDataBreachToday.com RSS Syndication
Australian Telecom Firm Leaks Data of 130,000 Customers
Australian Telecom Firm Leaks Data of 130,000 Customers'We're Sorry It Occurred, and We Know We Have Let You Down,' Telstra CFO SaysAustralian telecommunications provider Telstra apologized...
Royal Ransomware Hitting Healthcare Targets and Dumping Data
Royal Ransomware Hitting Healthcare Targets and Dumping DataTongue-in-Cheek Ransom Note Claims 'Modest Royalty' for 'Pentesting Services'Attackers wielding Royal ransomware have been hitting crypto-locking healthcare targets, the...
Microsoft alerta a la industria de criptomonedas sobre ciberataques dirigidos
Microsoft alerta a la industria de criptomonedas sobre ciberataques dirigidosLas empresas de inversión en criptomonedas son el objetivo de un grupo de amenazas en desarrollo que...
Proofpoint to Buy Deception Firm Illusive, Boost Offerings
Proofpoint to Buy Deception Firm Illusive, Boost OfferingsAshan Willy's First Deal as CEO Gets Proofpoint Into the Identity, Deception SpacesAshan Willy has made his first deal...
COVID-bit: nuevo canal COVert para filtrar datos de computadoras con espacio de aire
COVID-bit: nuevo canal COVert para filtrar datos de computadoras con espacio de aireUn método de exfiltración de datos no convencional aprovecha un canal encubierto previamente no...
Investigadores descubren que el nuevo malware Drokbk utiliza GitHub como un solucionador de Dead Drop
Investigadores descubren que el nuevo malware Drokbk utiliza GitHub como un solucionador de Dead DropSe ha atribuido al subgrupo de un grupo de estado-nación iraní conocido...
CommonSpirit Ransomware Breach Affects About 624,000 So Far
CommonSpirit Ransomware Breach Affects About 624,000 So FarLeaked Data Includes Names, Addresses and BirthdatesChicago-based hospital chain CommonSpirit reported to federal regulators that its October ransomware incident...
Mantenga a raya a su Grinch: así es como mantenerse seguro en línea esta temporada navideña
Mantenga a raya a su Grinch: así es como mantenerse seguro en línea esta temporada navideñaA medida que se acerca la temporada navideña, las compras en...
Hack-for-Hire Group apunta a entidades financieras y de viajes con una nueva variante de malware de Janicab
Hack-for-Hire Group apunta a entidades financieras y de viajes con una nueva variante de malware de JanicabLas agencias de viajes se han convertido en el objetivo...
Cisco advierte sobre una falla sin parchar de alta gravedad que afecta el firmware de teléfonos IP
Cisco advierte sobre una falla sin parchar de alta gravedad que afecta el firmware de teléfonos IPCisco ha lanzado una nueva advertencia de seguridad sobre una...
Russian Hackers Spotted Targeting U.S. Military Weapons and Hardware Supplier
Russian Hackers Spotted Targeting U.S. Military Weapons and Hardware SupplierA state-sponsored hacking group with links to Russia has been linked to attack infrastructure that spoofs the...
Chinese Hackers Using Russo-Ukrainian War Decoys to Target APAC and European Entities
Chinese Hackers Using Russo-Ukrainian War Decoys to Target APAC and European EntitiesThe China-linked nation-state hacking group referred to as Mustang Panda is using lures related to the ongoing...
How XDR Helps Protect Critical Infrastructure
How XDR Helps Protect Critical InfrastructureCritical infrastructure is important for societal existence, growth, and development. Societies are reliant on the services provided by critical infrastructure sectors...
Vice Society Ransomware Attackers Targeted Dozens of Schools in 2022
Vice Society Ransomware Attackers Targeted Dozens of Schools in 2022The Vice Society cybercrime group has disproportionately targeted educational institutions, accounting for 33 victims in 2022 and...
Iranian Hackers Strike Diamond Industry with Data-Wiping Malware in Supply-Chain Attack
Iranian Hackers Strike Diamond Industry with Data-Wiping Malware in Supply-Chain AttackAn Iranian advanced persistent threat (APT) actor known as Agrius has been attributed as behind a set of...
Google Warns of Internet Explorer Zero-Day Vulnerability Exploited by ScarCruft Hackers
Google Warns of Internet Explorer Zero-Day Vulnerability Exploited by ScarCruft HackersAn Internet Explorer zero-day vulnerability was actively exploited by a North Korean threat actor to target...
Best Year-End Cybersecurity Deals from Uptycs, SANS Institute, and Bitdefender
Best Year-End Cybersecurity Deals from Uptycs, SANS Institute, and BitdefenderLooking to up your cybersecurity game in the new year? Do not just buy electronics this vacation...
Apple Boosts Security With New iMessage, Apple ID, and iCloud Protections
Apple Boosts Security With New iMessage, Apple ID, and iCloud ProtectionsApple on Wednesday announced a raft of security measures, including an Advanced Data Protection setting that enables end-to-end...
COVID-bit: New COVert Channel to Exfiltrate Data from Air-Gapped Computers
COVID-bit: New COVert Channel to Exfiltrate Data from Air-Gapped ComputersAn unconventional data exfiltration method leverages a previously undocumented covert channel to leak sensitive information from air-gapped...
Researchers Uncover Darknet Service Allowing Hackers to Trojanize Legit Android Apps
Researchers Uncover Darknet Service Allowing Hackers to Trojanize Legit Android AppsResearchers have shed light on a new hybrid malware campaign targeting both Android and Windows operating...
MuddyWater Hackers Target Asian and Middle East Countries with Updated Tactics
MuddyWater Hackers Target Asian and Middle East Countries with Updated TacticsThe Iran-linked MuddyWater threat actor has been observed targeting several countries in the Middle East as well as...
Researchers Uncover New Drokbk Malware that Uses GitHub as a Dead Drop Resolver
Researchers Uncover New Drokbk Malware that Uses GitHub as a Dead Drop ResolverThe subgroup of an Iranian nation-state group known as Nemesis Kitten has been attributed as behind...
Why is Robust API Security Crucial in eCommerce?
Why is Robust API Security Crucial in eCommerce?API attacks are on the rise. One of their major targets is eCommerce firms like yours. APIs are a...
New TrueBot Malware Variant Leveraging Netwrix Auditor Bug and Raspberry Robin Worm
New TrueBot Malware Variant Leveraging Netwrix Auditor Bug and Raspberry Robin WormCybersecurity researchers have reported an increase in TrueBot infections, primarily targeting Mexico, Brazil, Pakistan, and the U.S....
US Congress rolls back proposal to restrict use of Chinese chips
US Congress rolls back proposal to restrict use of Chinese chipsAfter business groups argued that proposed legislation to curb use of Chinese-made semiconductors would hurt national...
Using XDR to Consolidate and Optimize Cybersecurity Technology
Using XDR to Consolidate and Optimize Cybersecurity TechnologyBusinesses know they need cybersecurity, but it seems like a new acronym and system is popping up every day....