ESXi-Targeting Ransomware: The Threats That Are After Your Virtual Machines (Part 1)Introduction In recent months, we have observed in our telemetry an increase in ransomware that...
Year: 2022
ESXi-Targeting Ransomware: The Threats That Are After Your Virtual Machines (Part 1)
ESXi-Targeting Ransomware: The Threats That Are After Your Virtual Machines (Part 1)Introduction In recent months, we have observed in our telemetry an increase in ransomware that...
Live Webinar | The Critical Role of SBOM in Securing Your Software Supply Chain
Live Webinar | The Critical Role of SBOM in Securing Your Software Supply ChainPost ContentRead MoreDataBreachToday.com RSS Syndication
Panel | Leveraging a Post-Pandemic IT Security Strategy to Mitigate Security Vendor Fatigue
Panel | Leveraging a Post-Pandemic IT Security Strategy to Mitigate Security Vendor FatiguePost ContentRead MoreDataBreachToday.com RSS Syndication
Possible Chinese Hackers Exploit Microsoft Exchange 0-Days
Possible Chinese Hackers Exploit Microsoft Exchange 0-DaysNo Patch Yet Available Although Exploitation Requires Authenticated AccessHackers, possibly Chinese, are exploiting Microsoft Exchange zero-day vulnerabilities to apparently implant...
Cloudflare, VCs Join Forces to Give $1.25B Away to Startups
Cloudflare, VCs Join Forces to Give $1.25B Away to StartupsVenture Capital Firms Commit Up to $50M Each for Startups Using Cloudflare WorkersCloudflare has joined forces with...
DOJ: Army Doc, Wife Sought to Leak Health Records to Russia
DOJ: Army Doc, Wife Sought to Leak Health Records to RussiaProsecutors Allege Both Doctors Aimed to Help Russia in Ukraine WarA Maryland couple faces federal indictment...
North Korean Trojanizing Open Source Software
North Korean Trojanizing Open Source SoftwareLazarus Group Uses Social Engineering to Manipulate Victims Into Downloading MalwareNorth Korean is using weaponized versions of open source utilities to...
The Country Where You Live Impacts Password Choices
The Country Where You Live Impacts Password ChoicesLiteracy, levels of personal freedom, and other macro-social factors help determine how strong average passwords are in a given...
Why the US Should Help Secure Mexican Infrastructure — and What It Gets in Return
Why the US Should Help Secure Mexican Infrastructure — and What It Gets in ReturnCall it cross-border enlightened self-interest: As one of the US's premier trade...
Our Quest: Advancing Product Labels to Help Consumers Consider Cybersecurity
Our Quest: Advancing Product Labels to Help Consumers Consider CybersecurityFor many decades, consumers have relied on labels to help them make decisions about which products to...
Meta Takes Down Russian “Smash-and-Grab” Disinformation Campaign
Meta Takes Down Russian "Smash-and-Grab" Disinformation CampaignChinese network targeting US mid-terms also closed downLeer másChinese network targeting US mid-terms also closed down
Cyber-Threats Top Business Leaders’ Biggest Concerns
Cyber-Threats Top Business Leaders' Biggest ConcernsMany are operating under a false sense of securityLeer másMany are operating under a false sense of security
ICO Reprimands UK Organizations for GDPR Failings
ICO Reprimands UK Organizations for GDPR FailingsSubject Access Requests experiencing significant delaysLeer másSubject Access Requests experiencing significant delays
Hacker Breaches Fast Company Apple News Account, Sends Racist Messages
Hacker Breaches Fast Company Apple News Account, Sends Racist MessagesThe breach seems related to the hack of Fast Company's website on Sunday afternoonLeer másThe breach seems...
Hackers Use Telegram and Signal to Assist Protestors in Iran
Hackers Use Telegram and Signal to Assist Protestors in IranKey activities are data leaking and selling, including officials' phone numbers and emailsLeer másKey activities are data...
WatchGuard Report: Malware Decreases but Encrypted Malware Up in Q2 2022
WatchGuard Report: Malware Decreases but Encrypted Malware Up in Q2 2022This could reflect threat actors shifting their tactics to rely on more elusive malwareLeer másThis could...
IRS Warns of “Industrial Scale” Smishing Surge
IRS Warns of "Industrial Scale" Smishing SurgeTax agency says automated tools are to blameLeer másTax agency says automated tools are to blame
5 Network Security Threats And How To Protect Yourself
5 Network Security Threats And How To Protect YourselfCybersecurity today matters so much because of everyone's dependence on technology, from collaboration, communication and collecting data to...
Crypto-Thieves Cost Victims 53 Times What They Make
Crypto-Thieves Cost Victims 53 Times What They MakeReport reveals surging cloud bills for crypto-jacking victimsLeer másReport reveals surging cloud bills for crypto-jacking victims
Researchers Identify 3 Hacktivist Groups Supporting Russian Interests
Researchers Identify 3 Hacktivist Groups Supporting Russian InterestsAt least three alleged hacktivist groups working in support of Russian interests are likely doing so in collaboration with...
Chinese Espionage Hackers Target Tibetans Using New LOWZERO Backdoor
Chinese Espionage Hackers Target Tibetans Using New LOWZERO BackdoorA China-aligned advanced persistent threat actor known as TA413 weaponized recently disclosed flaws in Sophos Firewall and Microsoft...
North Korea’s Lazarus Hackers Targeting macOS Users Interested in Crypto Jobs
North Korea's Lazarus Hackers Targeting macOS Users Interested in Crypto JobsThe infamous Lazarus Group has continued its pattern of leveraging unsolicited job opportunities to deploy malware...
Hacker Behind Optus Breach Releases 10,200 Customer Records in Extortion Scheme
Hacker Behind Optus Breach Releases 10,200 Customer Records in Extortion SchemeThe Australian Federal Police (AFP) on Monday disclosed it's working to gather "crucial evidence" and that...
New NullMixer Malware Campaign Stealing Users’ Payment Data and Credentials
New NullMixer Malware Campaign Stealing Users' Payment Data and CredentialsCybercriminals are continuing to prey on users searching for cracked software by directing them to fraudulent websites...
Mobile, Cloud and Email Are Top Threat Vectors For 2023
Mobile, Cloud and Email Are Top Threat Vectors For 2023PwC study finds organizations have a long way to go on securityLeer másPwC study finds organizations have...
Experts Uncover 85 Apps with 13 Million Downloads Involved in Ad Fraud Scheme
Experts Uncover 85 Apps with 13 Million Downloads Involved in Ad Fraud SchemeAs many as 75 apps on Google Play and 10 on Apple App Store...
Critical WhatsApp Bugs Could Have Let Attackers Hack Devices Remotely
Critical WhatsApp Bugs Could Have Let Attackers Hack Devices RemotelyWhatsApp has released security updates to address two flaws in its messaging app for Android and iOS that could...
Ukraine Says Russia Planning Massive Cyberattacks on its Critical Infrastructures
Ukraine Says Russia Planning Massive Cyberattacks on its Critical InfrastructuresThe Ukrainian government on Monday warned of "massive cyberattacks" by Russia targeting critical infrastructure facilities located in...
Hackers Using PowerPoint Mouseover Trick to Infect System with Malware
Hackers Using PowerPoint Mouseover Trick to Infect System with MalwareThe Russian state-sponsored threat actor known as APT28 has been found leveraging a new code execution method that makes...


























