CloudBees flaws in Jenkins server can lead to code executionCloudBees vulnerabilities in the Jenkins open-source automation server can be exploited to achieve code execution on targeted...
Day: March 9, 2023
Airlines and Airports Brace for New TSA Cybersecurity Measures Amidst Persistent Threats
Airlines and Airports Brace for New TSA Cybersecurity Measures Amidst Persistent ThreatsIn the latest move by the Biden administration to strengthen cybersecurity protections for critical infrastructure...
Major Healthcare Data Breach Impacts U.S. House Members
Major Healthcare Data Breach Impacts U.S. House MembersThreat actors breached the DC Health Link network, the healthcare administrator that serves the U.S. House of Representatives. Researchers...
Lazarus Group Hacks South Korean Financial Entity via Zero-Day Vulnerability
Lazarus Group Hacks South Korean Financial Entity via Zero-Day VulnerabilityOver the past year, the Lazarus Group has used flaws in an undisclosed software to breach a...
Putin’s Deepfake Campaign: A New Weapon in the War Against Dissent
Putin’s Deepfake Campaign: A New Weapon in the War Against DissentRussia continues its disinformation campaign around the Ukraine war through advanced social engineering tactics delivered by...
Red Team vs. Blue Team: What Is It?
Red Team vs. Blue Team: What Is It?With cyberattacks seemingly increasing at a high rate, companies have to make sure their details and information are secured...
On the Frontline of the Global Cyber War: Overview of Major russia-backed APT Groups Targeting Ukraine and Sigma Rules to Proactively Defend Against Their TTPs
On the Frontline of the Global Cyber War: Overview of Major russia-backed APT Groups Targeting Ukraine and Sigma Rules to Proactively Defend Against Their TTPs The...
Examining Ransomware Payments From a Data-Science Lens
Examining Ransomware Payments From a Data-Science LensIn this entry, we discuss case studies that demonstrated how data-science techniques were applied in our investigation of ransomware groups'...
Risk management policy
Risk management policySUMMARY Risk management involves the practice of addressing and handling threats to the organization in the form of cybersecurity attacks and compromised or lost...
Become your business’s cybersecurity expert
Become your business’s cybersecurity expertLearn a wide variety of topics for a lifetime with this eclectic bundle. The post Become your business’s cybersecurity expert appeared first...
IceFire ransomware now encrypts both Linux and Windows systems
IceFire ransomware now encrypts both Linux and Windows systemsThreat actors linked to the IceFire ransomware operation are now actively targeting Linux systems worldwide with a new dedicated encryptor....
Protecting collocated servers from DDoS attacks using GRE tunnels
Protecting collocated servers from DDoS attacks using GRE tunnelsYou can get DDoS protection remotely for your collocated server using a generic routing encapsulation (GRE) tunnel. We...
GitHub makes 2FA mandatory next week for active developers
GitHub makes 2FA mandatory next week for active developersGitHub will start requiring active developers to enable two-factor authentication (2FA) on their accounts beginning next week, on...
AT&T alerts 9 million customers of data breach after vendor hack
AT&T alerts 9 million customers of data breach after vendor hackAT&T is notifying roughly 9 million customers that some of their information has been exposed after...
SonicWall devices infected by malware that survives firmware upgrades
SonicWall devices infected by malware that survives firmware upgradesA suspected Chinese hacking campaign has been targeting unpatched SonicWall Secure Mobile Access (SMA) appliances to install custom...
Empowering women in cyber security: A CEO’s perspectives
Empowering women in cyber security: A CEO’s perspectivesMeet the founder and CEO of ReynCon, Connie Matthews Reynolds. With more than two decades of experience in the...
APAC | Fireside Chat | Stopping the Threats That Get Through Your Defences
APAC | Fireside Chat | Stopping the Threats That Get Through Your DefencesPost ContentRead MoreDataBreachToday.com RSS Syndication
Cryptohack Roundup: Tender.fi, Algodex
Cryptohack Roundup: Tender.fi, AlgodexAlso: Uranium Finance Hacker Moves Funds; BitKeep Moves to Refund VictimsEvery week, ISMG rounds up cybersecurity incidents in the world of digital assets....
CorePlague: vulnerabilidades graves en Jenkins
CorePlague: vulnerabilidades graves en JenkinsSe han revelado un par de vulnerabilidades de seguridad graves en el servidor de automatización de código abierto de Jenkins […]Read MoreBlog...
Critical Flaw in Cisco IP Phone Series Exposes Users to Command Injection Attack
Critical Flaw in Cisco IP Phone Series Exposes Users to Command Injection AttackCisco on Wednesday rolled out security updates to address a critical flaw impacting its IP Phone...
SysUpdate Malware Strikes Again with Linux Version and New Evasion Tactics
SysUpdate Malware Strikes Again with Linux Version and New Evasion TacticsThe threat actor known as Lucky Mouse has developed a Linux version of a malware toolkit called SysUpdate,...
Experts Identify Fully-Featured Info Stealer and Trojan in Python Package on PyPI
Experts Identify Fully-Featured Info Stealer and Trojan in Python Package on PyPIA malicious Python package uploaded to the Python Package Index (PyPI) has been found to...
2023 Browser Security Report Uncovers Major Browsing Risks and Blind Spots
2023 Browser Security Report Uncovers Major Browsing Risks and Blind SpotsAs a primary working interface, the browser plays a significant role in today's corporate environment. The...
New Cryptojacking Campaign Leverages Misconfigured Redis Database Servers
New Cryptojacking Campaign Leverages Misconfigured Redis Database ServersMisconfigured Redis database servers are the target of a novel cryptojacking campaign that leverages a legitimate and open source...
Hackers Exploit Containerized Environments to Steal Proprietary Data and Software
Hackers Exploit Containerized Environments to Steal Proprietary Data and SoftwareA sophisticated attack campaign dubbed SCARLETEEL is targeting containerized environments to perpetrate theft of proprietary data and software. "The...
Chinese Hackers Targeting European Entities with New MQsTTang Backdoor
Chinese Hackers Targeting European Entities with New MQsTTang BackdoorThe China-aligned Mustang Panda actor has been observed using a hitherto unseen custom backdoor called MQsTTang as part of an...
New Flaws in TPM 2.0 Library Pose Threat to Billions of IoT and Enterprise Devices
New Flaws in TPM 2.0 Library Pose Threat to Billions of IoT and Enterprise DevicesA pair of serious security defects has been disclosed in the Trusted...
HPE Acquires Axis Security to Gain SSE Platform
HPE Acquires Axis Security to Gain SSE Platform Hewlett-Packard Enterprise (HPE) has announced its intent to acquire Axis Security, a provider of a secure service edge...
Addressing TSA’s Aviation Security Emergency Mandates for Airlines and Airports
Addressing TSA’s Aviation Security Emergency Mandates for Airlines and AirportsThe Department of Homeland Security (DHS) and its Transportation Security Administration (TSA) have issued a handful of...
Why software transparency is critical: Understanding supply chain security in a software-driven society
Why software transparency is critical: Understanding supply chain security in a software-driven society By now the topic of software supply chain security is clearly among the...