We can make our phones harder to hack but complete security is a pipe dream | John NaughtonEven the latest iPhone scare won’t persuade us to...
Year: 2022
‘Lives are at stake’: hacking of US hospitals highlights deadly risk of ransomware
‘Lives are at stake’: hacking of US hospitals highlights deadly risk of ransomwareThe number of ransomware attacks on US healthcare organizations increased 94% from 2021 to...
Lessons from the Field: Trackers, the Third Wheel Between You and Your Customer
Lessons from the Field: Trackers, the Third Wheel Between You and Your CustomerContenido de la entradaLeer másDataBreachToday.com RSS Syndication
Urology Center Breach Lawsuit Settlement Returning to Court
Urology Center Breach Lawsuit Settlement Returning to CourtEntity Agreed to Compensate Nearly 138,000 Affected in 2021 LeakA Colorado-based urology practice agreed to compensate nearly 138,000 individuals...
Bitwarden Raises $100M to Go Passwordless, Defend Developers
Bitwarden Raises $100M to Go Passwordless, Defend DevelopersPSG Funding Will Enable Bitwarden to Get into Passwordless and Developer SecretsBitwarden has raised $100 million to expand into...
Albania Cuts Diplomatic Ties With Iran After Cyberattack
Albania Cuts Diplomatic Ties With Iran After CyberattackUS Accuses Iran of Violating Cyber Norms, Vows Further ActionAlbania cut diplomatic ties with Iran following a July cyberattack...
Former Members of Conti Are Targeting Ukraine, Google Says
Former Members of Conti Are Targeting Ukraine, Google SaysInitial Access Broker Also Tied to Hits on European Humanitarian OrganizationsWhether for profit or in furtherance of Russian...
DEADBOLT ransomware rears its head again, attacks QNAP devices
DEADBOLT ransomware rears its head again, attacks QNAP devicesNAS devices make it easy for anyone to add high-capacity file servers to their network. Guess why cybercrooks...
Channel 4 optimizes cybersecurity and boosts efficiency after partnering with Invicti
Channel 4 optimizes cybersecurity and boosts efficiency after partnering with InvictiUsing Invicti for vulnerability scanning has allowed Channel 4 to improve security while also spending less...
What Is Your Security Team Profile? Prevention, Detection, or Risk Management
What Is Your Security Team Profile? Prevention, Detection, or Risk ManagementNot all security teams are born equal. Each organization has a different objective. In cybersecurity, adopting...
QNAP Warns of New DeadBolt Ransomware Attacks Exploiting Photo Station Flaw
QNAP Warns of New DeadBolt Ransomware Attacks Exploiting Photo Station FlawQNAP has issued a new advisory urging users of its network-attached storage (NAS) devices to upgrade...
TikTok Denies Data Breach Reportedly Exposing Over 2 Billion Users’ Information
TikTok Denies Data Breach Reportedly Exposing Over 2 Billion Users' InformationPopular short-form social video service TikTok denied reports that it was breached by a hacking group,...
New EvilProxy Phishing Service Allowing Cybercriminals to Bypass 2-Factor Security
New EvilProxy Phishing Service Allowing Cybercriminals to Bypass 2-Factor SecurityA new phishing-as-a-service (PhaaS) toolkit dubbed EvilProxy is being advertised on the criminal underground as a means...
Researchers Find New Android Spyware Campaign Targeting Uyghur Community
Researchers Find New Android Spyware Campaign Targeting Uyghur CommunityA previously undocumented strain of Android spyware with extensive information gathering capabilities has been found disguised as a...
Worok Hackers Target High-Profile Asian Companies and Governments
Worok Hackers Target High-Profile Asian Companies and GovernmentsHigh-profile companies and local governments located primarily in Asia are the subjects of targeted attacks by a previously undocumented...
TA505 Hackers Using TeslaGun Panel to Manage ServHelper Backdoor Attacks
TA505 Hackers Using TeslaGun Panel to Manage ServHelper Backdoor AttacksCybersecurity researchers have offered fresh insight into a previously undocumented software control panel used by a financially...
Integrating Live Patching in SecDevOps Workflows
Integrating Live Patching in SecDevOps WorkflowsSecDevOps is, just like DevOps, a transformational change that organizations undergo at some point during their lifetime. Just like many other...
Mirai Variant MooBot Botnet Exploiting D-Link Router Vulnerabilities
Mirai Variant MooBot Botnet Exploiting D-Link Router VulnerabilitiesA variant of the Mirai botnet known as MooBot is co-opting vulnerable D-Link devices into an army of denial-of-service...
Critical RCE Vulnerability Affects Zyxel NAS Devices — Firmware Patch Released
Critical RCE Vulnerability Affects Zyxel NAS Devices — Firmware Patch ReleasedNetworking equipment maker Zyxel has released patches for a critical security flaw impacting its network-attached storage...
New Stealthy Shikitega Malware Targeting Linux Systems and IoT Devices
New Stealthy Shikitega Malware Targeting Linux Systems and IoT DevicesA new piece of stealthy Linux malware called Shikitega has been uncovered adopting a multi-stage infection chain...
North Korean Hackers Deploying New MagicRAT Malware in Targeted Campaigns
North Korean Hackers Deploying New MagicRAT Malware in Targeted CampaignsThe prolific North Korean nation-state actor known as the Lazarus Group has been linked to a new...
4 Key Takeaways from “XDR is the Perfect Solution for SMEs” webinar
4 Key Takeaways from "XDR is the Perfect Solution for SMEs" webinarCyberattacks on large organizations dominate news headlines. So, you may be surprised to learn that...
Some Members of Conti Group Targeting Ukraine in Financially Motivated Attacks
Some Members of Conti Group Targeting Ukraine in Financially Motivated AttacksFormer members of the Conti cybercrime cartel have been implicated in five different campaigns targeting Ukraine...
Authorities Shut Down WT1SHOP Site for Selling Stolen Credentials and Credit Cards
Authorities Shut Down WT1SHOP Site for Selling Stolen Credentials and Credit CardsAn international law enforcement operation has resulted in the dismantling of WT1SHOP, an online criminal marketplace...
Top 5 Zero-Day Vulnerabilities of August
Top 5 Zero-Day Vulnerabilities of AugustZero day vulnerabilities and exploits are unexpected, hence zero-day protection is required. Here are some suggestions for preventing zero-day attacks on...
Game-Related Cyber-Threats: Almost 100k Malicious Files Last Year
Game-Related Cyber-Threats: Almost 100k Malicious Files Last YearKaspersky also observed an increase in the number of programs that can steal secretsLeer másKaspersky also observed an increase...
Password Reuse is Putting MSP’s at Risk
Password Reuse is Putting MSP’s at RiskPassword hygiene is a huge priority for Managed Service Providers Every organization is at risk for cyber attack, but MSPs...
Google Vulnerability Reward Program Focuses on Open Source Software
Google Vulnerability Reward Program Focuses on Open Source Software Google’s bug bounty program will be expanded to include a special open source section called the Open...
BlackCat Ransomware Linked to Italy’s Energy Services Firm Hack
BlackCat Ransomware Linked to Italy's Energy Services Firm HackThe ransomware group claimed to have downloaded 700GB of data from GSELeer másThe ransomware group claimed to have...
The Mayhem for API Difference – A ZAP – API Scan Comparison
The Mayhem for API Difference – A ZAP – API Scan ComparisonWith the rapid development of modern web APIs, developers must balance quality, reliability, and security...





























