Keralty ransomware attack impacts Colombia's health care systemThe Keralty multinational healthcare organization suffered a RansomHouse ransomware attack on Sunday, disrupting the websites and operations of the...
Year: 2022
Emotet Detection: Infamous Botnet Resurfaces to the Email Threat Landscape
Emotet Detection: Infamous Botnet Resurfaces to the Email Threat Landscape Cybersecurity researchers have observed a burst of the new malicious activity of the Emotet botnet, which...
Smashing Security podcast #300: Interplanetary file systems, iSpoof, and don’t delete Twitter
Smashing Security podcast #300: Interplanetary file systems, iSpoof, and don’t delete TwitterWhy deleting your Twitter account may be a very bad idea, how the police unravelled...
Facebook Fined $276M under GDPR
Facebook Fined $276M under GDPRFacebook—Meta—was just fined $276 million (USD) for a data leak that included full names, birth dates, phone numbers, and location. Meta’s total...
Sirius XM Software Vulnerability
Sirius XM Software VulnerabilityThis is new: Newly revealed research shows that a number of major car brands, including Honda, Nissan, Infiniti, and Acura, were affected by...
How Akamai Helps to Mitigate the OWASP API Security Top 10 Vulnerabilities
How Akamai Helps to Mitigate the OWASP API Security Top 10 VulnerabilitiesExperts warn that API attacks will soon become the most common type of web application...
What is Account Takeover and How to Prevent It in 2022
What is Account Takeover and How to Prevent It in 2022An account takeover (ATO), in which criminals impersonate legitimate account owners to take control of an...
GoTo says hackers breached its dev environment, cloud storage
GoTo says hackers breached its dev environment, cloud storageRemote access and collaboration company GoTo disclosed today that they suffered a security breach where threat actors gained...
Industry 4.0: CNC Machine Security Risks Part 1
Industry 4.0: CNC Machine Security Risks Part 1This three-part blog series explores the risks associated with CNC machinesLeer másTrend Micro Research, News, PerspectivesThis three-part blog series...
Meet the most comprehensive portable cybersecurity device
Meet the most comprehensive portable cybersecurity deviceThis deal is your last chance to get the Deeper Connect Pico Decentralized VPN at $50 off plus free shipping....
Hyundai app bugs allowed hackers to remotely unlock, start cars
Hyundai app bugs allowed hackers to remotely unlock, start carsVulnerabilities in mobile apps exposed Hyundai and Genesis car models after 2012 to remote attacks that allowed...
As a technology leader, Celebrate National Computer Security Day!
As a technology leader, Celebrate National Computer Security Day!EXECUTIVE SUMMARY: As a technology leader, you know that cyber security is a rapidly-evolving area and that there...
GUEST ESSAY: ‘Nag attacks’ — this new phishing variant takes full advantage of notification fatigue
GUEST ESSAY: ‘Nag attacks’ — this new phishing variant takes full advantage of notification fatigueOne must admire the ingenuity of cybercriminals. Related: Thwarting email attacks A...
Brooklyn Hospitals Decried for Silence on Cyber Incident
Brooklyn Hospitals Decried for Silence on Cyber IncidentOne Brooklyn Health Systems Three Hospitals Systems Affected by Nov. 19 HackAs three Brooklyn safety net hospitals grapple with...
Open Systems Buys Tiberium to Automate Security on Microsoft
Open Systems Buys Tiberium to Automate Security on MicrosoftBritish MSSP Uses Microsoft to Automate the Handling of Basic Security AlertsOpen Systems has purchased an early-stage Microsoft-centric...
Acer Fixes Bugs That Enable Attackers to Bypass Secure Boot
Acer Fixes Bugs That Enable Attackers to Bypass Secure BootVulnerabilities May Allow Deployment of Malicious Bugs and System PrivilegesAcer fixed high-severity bugs that hackers could use...
Okta Clears Up Customer Identity Confusion as SMB Sales Dip
Okta Clears Up Customer Identity Confusion as SMB Sales DipAttrition Falls, Customer Identity Sales Rise, But Some SMBs Are Pumping the BrakesOkta has stemmed employee attrition...
Acer corrige errores de UEFI que se pueden usar para deshabilitar el arranque seguro
Acer corrige errores de UEFI que se pueden usar para deshabilitar el arranque seguroAcer solucionó una vulnerabilidad de alta gravedad que afectaba a varios modelos de...
Meta es multada en Europa con 265M€ por no cumplir la normativa de protección de datos
Meta es multada en Europa con 265M€ por no cumplir la normativa de protección de datosLa Comisión de Protección de Datos de Irlanda (DPC) ha anunciado...
Estados Unidos prohíbe equipos de telecomunicaciones y cámaras de vigilancia chinos
Estados Unidos prohíbe equipos de telecomunicaciones y cámaras de vigilancia chinosLa Comisión Federal de Comunicaciones (FCC) de EE. UU. anunció formalmente que ya no autorizará equipos...
Belgian Police Under Fire After Major Ransomware Leak
Belgian Police Under Fire After Major Ransomware LeakCrime reports dating back 15 years are made publicLeer másCrime reports dating back 15 years are made public
Orange Cyberdefense Unveils Its Security Navigator With OT Hacking Demos
Orange Cyberdefense Unveils Its Security Navigator With OT Hacking DemosThe cybersecurity arm of Orange Business Services (OBS) organized a launch event at its Lyon campus, in...
Millions of Twitter Accounts Potentially Compromised
Millions of Twitter Accounts Potentially CompromisedThe breach affected any account with the "Let others find you by your phone" option enabledLeer másThe breach affected any account...
5.4 million Twitter users’ stolen data leaked online — more shared privately
5.4 million Twitter users' stolen data leaked online — more shared privatelyOver 5.4 million Twitter user records containing non-public information stolen using an API vulnerability fixed...
Phishing Campaign Impersonating UAE Ministry of Human Resources Grows
Phishing Campaign Impersonating UAE Ministry of Human Resources GrowsNew cluster of phishing domains registered using similar naming schemes discoveredLeer másNew cluster of phishing domains registered using...
Elon Musk Unveils End-to-End Encrypted DMs For Twitter 2.0
Elon Musk Unveils End-to-End Encrypted DMs For Twitter 2.0The E2EE feature was first spotted by mobile researcher Jane Manchun Wong earlier this monthLeer másThe E2EE feature...
US bans sales of Huawei, Hikvision, ZTE, and Dahua equipment
US bans sales of Huawei, Hikvision, ZTE, and Dahua equipmentThe United States government, through the Federal Communications Commission (FCC), has banned the sale of equipment from Chinese...
Web App and API Attacks Surge 257% in Financial Services
Web App and API Attacks Surge 257% in Financial ServicesData and credentials at risk in the verticalLeer másData and credentials at risk in the vertical
The Cyber Monday 2022 Security, IT, VPN, & Antivirus Deals
The Cyber Monday 2022 Security, IT, VPN, & Antivirus DealsCyber Monday is here, and great deals are live in computer security, software, online courses, system admin...
Experts Find 16,000+ Scam FIFA World Cup Domains
Experts Find 16,000+ Scam FIFA World Cup DomainsSocial media ads and accounts help to drive trafficLeer másSocial media ads and accounts help to drive traffic

























