Russia's VTB Bank Suffers its Biggest Ever DDoSUkraine suspected of attack on state-owned lenderLeer másUkraine suspected of attack on state-owned lender
Month: December 2022
ICO Fines Rogue Nuisance Callers £500,000
ICO Fines Rogue Nuisance Callers £500,000Some companies forced victims to share card detailsLeer másSome companies forced victims to share card details
UK Government Department Using Unsupported Applications, Reveals Watchdog
UK Government Department Using Unsupported Applications, Reveals WatchdogAlmost a third (30%) of applications used by Defra are unsupported, a report from the National Audit Office has...
USENIX Security ’22 – Octavian Suciu, Connor Nelson, Zhuoer Lyu, Tiffany Bao, Tudor Dumitraș’ Expected Exploitability: Predicting the Development of Functional Vulnerability Exploits’
USENIX Security ’22 – Octavian Suciu, Connor Nelson, Zhuoer Lyu, Tiffany Bao, Tudor Dumitraș’ Expected Exploitability: Predicting the Development of Functional Vulnerability Exploits’Our thanks to USENIX...
What you should know when considering cyber insurance in 2023
What you should know when considering cyber insurance in 2023As the frequency and severity of ransomware, phishing, and denial of service attacks has increased, so has...
GUEST ESSAY: ‘Continuous authentication’ is driving passwordless sessions into the mainstream
GUEST ESSAY: ‘Continuous authentication’ is driving passwordless sessions into the mainstreamMuch more effective authentication is needed to help protect our digital environment – and make user...
Lightspin announces full coverage for AWS Vortex, AWS Time Machine and 3 others services following AWS Re:Invent
Lightspin announces full coverage for AWS Vortex, AWS Time Machine and 3 others services following AWS Re:Invent Today, Lightspin is thrilled to announce that our cloud...
The changing role of the MITRE ATT@CK framework
The changing role of the MITRE ATT@CK frameworkSince its creation in 2013, the MITRE ATT&CK framework has been of interest to security operations professionals. In the...
What Is Domain Spoofing and How to Stop It
What Is Domain Spoofing and How to Stop ItDomain spoofing tricks users into visiting a malicious site. Learn about domain spoofing and how to stop them....
The cybersecurity challenges and opportunities of digital twins
The cybersecurity challenges and opportunities of digital twinsDigital twins are a digital representation of objects, structures or systems that give organizations greater insight into the life...
Themes from Bosch Connected World 2022: The Role of Cybersecurity in the Future of Digital
Themes from Bosch Connected World 2022: The Role of Cybersecurity in the Future of DigitalRead on for part two of my recap of Bosch Connected World,...
Mass Murderer Told Colorado Police About Stockpiled Assault Weapons for Terrorism: They Closed the Case Citing “Constitutional Right”, Which Left 5 Dead Before Military Veteran Stepped In
Mass Murderer Told Colorado Police About Stockpiled Assault Weapons for Terrorism: They Closed the Case Citing “Constitutional Right”, Which Left 5 Dead Before Military Veteran Stepped...
Action1 launches threat actor filtering to block remote management platform abuse
Action1 launches threat actor filtering to block remote management platform abuseAction1 has announced new AI-based threat actor filtering to detect and block abuse of its remote...
Flaws in MegaRAC baseband management firmware impact many server brands
Flaws in MegaRAC baseband management firmware impact many server brandsResearchers have found three vulnerabilities in AMI MegaRAC, a baseband management controller (BMC) firmware used by multiple...
Ransomware attack knocks Rackspace’s Exchange servers offline
Ransomware attack knocks Rackspace’s Exchange servers offlineRackspace’s hosting for Exchange servers remained offline Tuesday after an outage Friday that the company now ascribes to a ransomware...
Athletic shoe maker Brooks runs down cyberattacks with zero-trust segmentation
Athletic shoe maker Brooks runs down cyberattacks with zero-trust segmentationRansomware was again the top attack type in 2021, with manufacturing replacing financial services as the top...
What Airtel’s new Face Match based eKYC Verification means for India
What Airtel’s new Face Match based eKYC Verification means for IndiaAirtel’s latest initiative prioritizes digital onboarding methods to assist online customer onboarding for its payments bank...
National Pearl Harbor Remembrance Day, In Memoriam: The 2,403
National Pearl Harbor Remembrance Day, In Memoriam: The 2,403National Pearl Harbor Remembrance Day, also referred to as Pearl Harbor Remembrance Day or Pearl Harbor Day, is...
8 Mistakes to Avoid When Onboarding Your First Compliance Automation Solution
8 Mistakes to Avoid When Onboarding Your First Compliance Automation SolutionOnboarding new automated solutions is no simple task. Discover the 8 mistakes to avoid when onboarding...
Financial Services IT Teams Relying on Legacy Cybersecurity Plagued By False Positives and Negatives
Financial Services IT Teams Relying on Legacy Cybersecurity Plagued By False Positives and NegativesCybersecurity teams working in financial and banking settings face a constant struggle —...
SIM swapper sent to prison for 2FA cryptocurrency heist of over $20m
SIM swapper sent to prison for 2FA cryptocurrency heist of over $20mGuilty party got 18 months, also has to pay back $20m he probably hasn't got,...
Telcom and BPO Companies Under Attack by SIM Swapping Hackers
Telcom and BPO Companies Under Attack by SIM Swapping HackersA persistent intrusion campaign has set its eyes on telecommunications and business process outsourcing (BPO) companies at...
Understanding NIST CSF to assess your organization’s Ransomware readiness
Understanding NIST CSF to assess your organization's Ransomware readinessRansomware attacks keep increasing in volume and impact largely due to organizations' weak security controls. Mid-market companies are...
Darknet’s Largest Mobile Malware Marketplace Threatens Users Worldwide
Darknet's Largest Mobile Malware Marketplace Threatens Users WorldwideCybersecurity researchers have shed light on a darknet marketplace called InTheBox that's designed to specifically cater to mobile malware operators. The...
New Go-based Zerobot Botnet Exploiting Dozen of IoT Vulnerabilities to Expand its Network
New Go-based Zerobot Botnet Exploiting Dozen of IoT Vulnerabilities to Expand its NetworkA novel Go-based botnet called Zerobot has been observed in the wild proliferating by taking advantage...
Iranian State Hackers Targeting Key Figures in Activism, Journalism, and Politics
Iranian State Hackers Targeting Key Figures in Activism, Journalism, and PoliticsHackers with ties to the Iranian government have been linked to an ongoing social engineering and...
Chinese Hackers Target Middle East Telecoms in Latest Cyber Attacks
Chinese Hackers Target Middle East Telecoms in Latest Cyber AttacksA malicious campaign targeting the Middle East is likely linked to BackdoorDiplomacy, an advanced persistent threat (APT) group...
Microsoft Alerts Cryptocurrency Industry of Targeted Cyber Attacks
Microsoft Alerts Cryptocurrency Industry of Targeted Cyber AttacksCryptocurrency investment companies are the target of a developing threat cluster that uses Telegram groups to seek out potential...
Open Source Ransomware Toolkit Cryptonite Turns Into Accidental Wiper Malware
Open Source Ransomware Toolkit Cryptonite Turns Into Accidental Wiper MalwareA version of an open source ransomware toolkit called Cryptonite has been observed in the wild with wiper capabilities...
Data Breaches: What They Are, Why They Occur, and How to Prevent Them
Data Breaches: What They Are, Why They Occur, and How to Prevent ThemData breaches are invaluable to understanding a threat actor’s goals and motivations. Often fueled...