What CISOs Can Do About Brand Impersonation Scam SitesApply these nine tips to proactively fight fraudulent websites that use your brand to rip people off.Read MoreDark...
Month: February 2023
Name That Edge Toon: For the Birds
Name That Edge Toon: For the BirdsCome up with a clever caption, and our panel of experts will reward the winner with a $25 Amazon gift...
How Cybercriminals Are Operationalizing Money Laundering and What to Do About It
How Cybercriminals Are Operationalizing Money Laundering and What to Do About ItIt's time to share threat intelligence and prioritize digital literacy and cyber hygiene to stem...
Ransomware scum launch wave of attacks on critical, but old, VMWare ESXi vuln
Ransomware scum launch wave of attacks on critical, but old, VMWare ESXi vulnYou’ve had almost two years to patch and some of the software is EOL,...
School laptop auction devolves into extortion allegation
School laptop auction devolves into extortion allegationAlso: Atlassian says Jira has a 9.4 severity bug and the TSA issues milquetoast no-fly list security advisory When a...
Keeping unstructured data safe and sound
Keeping unstructured data safe and soundHow Dell PowerScale helps defend against information breaches Webinar There was a time when data was stored in cardboard files inside...
Crypto’s Decentralized Finance Security Problem
Crypto's Decentralized Finance Security ProblemAuditing Itself Can;t Ensure SecurityHolding cryptocurrencies in anything but a memory drive inside a box shielded with a Faraday cage was seemingly...
Notorious Finnish Hacker ‘Zeekill’ Busted by French Police
Notorious Finnish Hacker 'Zeekill' Busted by French PoliceAleksanteri Kivimaki Charged With Mental Health Patient Data Breach and ExtortionFrench police arrested hacker Aleksanteri Kivimäki, 25, who's suspected...
Discussion: Mitigating Risks to Customer Account Integrity
Discussion: Mitigating Risks to Customer Account IntegrityTeleSign's Seth Gilpin on Fraud and Risk Management in Customer Account and Device Security.Digital transformation we all have experienced over...
Rising ‘Firebrick Ostrich’ BEC Group Launches Industrial-Scale Cyberattacks
Rising 'Firebrick Ostrich' BEC Group Launches Industrial-Scale CyberattacksThe group's wanton attacks demonstrate that business email compromise is everything a hacker can want in one package: low...
Rising ‘Firebrick Ostrich’ BEC Group Launches Industrial-Scale Cyberattacks
Rising 'Firebrick Ostrich' BEC Group Launches Industrial-Scale CyberattacksThe group's wanton attacks demonstrate that business email compromise is everything a hacker can want in one package: low...
Have we learnt nothing from SolarWinds supply chain attacks? Not yet it appears
Have we learnt nothing from SolarWinds supply chain attacks? Not yet it appearsFrom frameworks to new federal offices it's time to get busy The hack of...
Rising ‘Firebrick Ostrich’ BEC Group Launches Industrial-Scale Cyberattacks
Rising 'Firebrick Ostrich' BEC Group Launches Industrial-Scale CyberattacksThe group's wanton attacks demonstrate that business email compromise is everything a hacker can want in one package: low...
Massive Ransomware Campaign Targets VMware ESXi Servers
Massive Ransomware Campaign Targets VMware ESXi ServersVulnerability Patched in 2021 Still Haunts Admins at Over 300 OrganizationsA massive automated ransomware campaign is targeting VMware ESXi hypervisors...
Rising ‘Firebrick Ostrich’ BEC Group Launches Industrial-Scale Cyberattacks
Rising 'Firebrick Ostrich' BEC Group Launches Industrial-Scale CyberattacksThe group's wanton attacks demonstrate that business email compromise is everything a hacker can want in one package: low...
Iran crew stole Charlie Hebdo database, says Microsoft
Iran crew stole Charlie Hebdo database, says MicrosoftSame gang pestered US voters during 2020 presidential election Microsoft believes the gang who boasted it had stolen and...
Rising ‘Firebrick Ostrich’ BEC Group Launches Industrial-Scale Cyberattacks
Rising 'Firebrick Ostrich' BEC Group Launches Industrial-Scale CyberattacksThe group's wanton attacks demonstrate that business email compromise is everything a hacker can want in one package: low...
Guy accused of wrecking crypto exchange now hauled into court
Guy accused of wrecking crypto exchange now hauled into courtMango Markets still offline for now ... but v4 comeback release looms The man accused of bringing...
Fast-evolving Prilex POS malware can block contactless payments
Fast-evolving Prilex POS malware can block contactless payments... forcing users to insert their cards into less-secure PIN systems The reasons businesses and consumers like contactless payment...
HeadCrab bots pinch 1,000+ Redis servers to mine coins
HeadCrab bots pinch 1,000+ Redis servers to mine coinsWe devoting full time to floating under /etc A sneaky botnet dubbed HeadCrab that uses bespoke malware to...
Cyber Insurer Sees Remote Access, Cloud Databases Under Fire
Cyber Insurer Sees Remote Access, Cloud Databases Under FireReminder: Real-World Attacks Often Focus on Small Subset of Known VulnerabilitiesCriminals lately have been prioritizing two types of...
Indian Official Highlights Djvu Ransomware as Threat
Indian Official Highlights Djvu Ransomware as ThreatDjvu Camouflages Itself as Cracked SoftwareAn Indian cybersecurity official highlighted Djvu ransomware as a threat, saying that "maximum companies" are...
IBM Security GM on Seeing a Target Through the Hacker’s Eyes
IBM Security GM on Seeing a Target Through the Hacker's EyesMary O'Brien on How External Attack Surface Management Finds Internet-Facing IssuesCompanies can be blinded by their...
Hackers Posing as Ukrainian Ministry Deploy Info Stealers
Hackers Posing as Ukrainian Ministry Deploy Info StealersSpoofed Polish Police Websites Also FoundUkrainian and Polish cyber defenders are warning against a slew of phishing websites that...
CrowdStrike CEO on Why It’s Tough to Defend Sensitive Assets
CrowdStrike CEO on Why It's Tough to Defend Sensitive AssetsGeorge Kurtz on How Reposify Helps Customers Locate and Safeguard Priority AssetsOrganizations today struggle with both new...
¿Es segura tu estación de carga EV? Nuevas vulnerabilidades de seguridad descubiertas
¿Es segura tu estación de carga EV? Nuevas vulnerabilidades de seguridad descubiertasDos nuevas debilidades de seguridad descubiertas en varios sistemas de carga de vehículos eléctricos (EV)...
Nuevas vulnerabilidades de alta gravedad descubiertas en los productos Cisco IOx y F5 BIG-IP
Nuevas vulnerabilidades de alta gravedad descubiertas en los productos Cisco IOx y F5 BIG-IPF5 advirtió sobre una falla de alta gravedad que afecta a los dispositivos...
Rising ‘Firebrick Ostrich’ BEC Group Launches Industrial-Scale Cyberattacks
Rising 'Firebrick Ostrich' BEC Group Launches Industrial-Scale CyberattacksThe group's wanton attacks demonstrate that business email compromise is everything a hacker can want in one package: low...
Chinese surveillance balloon over US causes fearful gasbagging
Chinese surveillance balloon over US causes fearful gasbaggingFloats over missile silos, shooting it down ruled more dangerous than whatever it's up to A Chinese high-altitude surveillance...
LockBit claims responsibility for ION ransomware attack but US/UK hounds are sniffing
LockBit claims responsibility for ION ransomware attack but US/UK hounds are sniffingCrims put a February 4 deadline for software provider to pay up UK regulators are...