Polish intelligence dismantled a network of Russian spiesPolish intelligence dismantled a cell of Russian spies that gathered info on military equipment deliveries to Ukraine via the...
Day: March 16, 2023
CISA Warns of Adobe ColdFusion Vulnerability Exploited in the Wild
CISA Warns of Adobe ColdFusion Vulnerability Exploited in the WildOn March 15, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) added a new vulnerability to its...
For Sale: Data Supposedly Coming from the US Marshals Service Hack
For Sale: Data Supposedly Coming from the US Marshals Service HackThreat actors are selling what they pretend to be data stolen from U.S. Marshals Service (USMS)...
Australia’s Latitude Financial Hit by Cyberattack, Exposing 328K Client Data
Australia’s Latitude Financial Hit by Cyberattack, Exposing 328K Client DataOn Thursday, Latitude Group Holdings, an Australian company that handles digital payments and loans, revealed that a...
SASE 101: Understanding the Fundamentals of Secure Access Service Edge
SASE 101: Understanding the Fundamentals of Secure Access Service EdgeIn today’s digital age, businesses are increasingly moving their operations to the cloud. However, with this shift...
SECURITY ALERT: Actively Exploited Microsoft Outlook Vulnerability Imperils Microsoft 365 Apps
SECURITY ALERT: Actively Exploited Microsoft Outlook Vulnerability Imperils Microsoft 365 AppsThe cyber-research community raises concerns over a vulnerability that puts the Microsoft 365 suite at risk....
Detect CVE-2023-23397 Exploits: Critical Elevation of Privilege Vulnerability in Microsoft Outlook Leveraged in the Wild to Target European Government and Military
Detect CVE-2023-23397 Exploits: Critical Elevation of Privilege Vulnerability in Microsoft Outlook Leveraged in the Wild to Target European Government and Military Security heads-up for cyber defenders!...
Electronic data disposal policy
Electronic data disposal policyPURPOSE The purpose of this policy is to provide guidelines for the appropriate disposal of information and the destruction of electronic media, which...
Winter Vivern APT hackers use fake antivirus scans to install malware
Winter Vivern APT hackers use fake antivirus scans to install malwareAn advanced hacking group named 'Winter Vivern' targets European government organizations and telecommunication service providers to...
Microsoft support ‘cracks’ Windows for customer after activation fails
Microsoft support 'cracks' Windows for customer after activation failsIn an unexpected twist, a Microsoft support engineer resorted to running an unofficial 'crack' on a customer's Windows...
Convincing Twitter ‘quote tweet’ phone scam targets bank customers
Convincing Twitter 'quote tweet' phone scam targets bank customersA convincing Twitter scam is targeting bank customers by abusing the quote-tweets feature, as observed by BleepingComputer. The scam preys...
Microsoft unveils AI-powered Microsoft 365 Copilot assistant
Microsoft unveils AI-powered Microsoft 365 Copilot assistantMicrosoft has announced a new assistant powered by artificial intelligence to help boost productivity across Microsoft 365 apps, currently being tested...
Latitude cyberattack leads to data theft at two service providers
Latitude cyberattack leads to data theft at two service providersLatitude Financial Services (Latitude) has published a notice on its website today informing that it has suffered...
Supercharge your productivity, with five ingenious ChatGPT integrations
Supercharge your productivity, with five ingenious ChatGPT integrationsEXECUTIVE SUMMARY: The powerful next-generation artificial intelligence-based tool known as ChatGPT has not only captured the public’s imagination; it’s...
Voice system used to verify identity by Centrelink can be fooled by AI
Voice system used to verify identity by Centrelink can be fooled by AIExclusive: Voiceprint program used by millions of Australians to access data held by government...
Cryptohack Roundup: ChipMixer, Euler Finance, Unpatched Bugs
Cryptohack Roundup: ChipMixer, Euler Finance, Unpatched BugsAlso: Dero, Poolz Finance Hack and a Report on Ransomware FinancingEvery week, ISMG rounds up cybersecurity incidents in the world...
CISA advierte sobre el error de Adobe ColdFusion explotado como un día cero
CISA advierte sobre el error de Adobe ColdFusion explotado como un día ceroCISA ha agregado una vulnerabilidad crítica que afecta las versiones 2021 y 2018 de...
New Critical Flaw in FortiOS and FortiProxy Could Give Hackers Remote Access
New Critical Flaw in FortiOS and FortiProxy Could Give Hackers Remote AccessFortinet has released fixes to address 15 security flaws, including one critical vulnerability impacting FortiOS and...
CISA Issues Urgent Warning: Adobe ColdFusion Vulnerability Exploited in the Wild
CISA Issues Urgent Warning: Adobe ColdFusion Vulnerability Exploited in the WildThe U.S. Cybersecurity and Infrastructure Security Agency (CISA) on March 15 added a security vulnerability impacting Adobe ColdFusion...
How to Measure Your Risk Monitoring Activities
How to Measure Your Risk Monitoring ActivitiesThis article was originally featured in ASIS International Ideally, businesses should use data to inform and contextualize their most important...
The Comprehensive Value of Investing in Both Cybersecurity and Cyber Insurance
The Comprehensive Value of Investing in Both Cybersecurity and Cyber Insurance With ransomware attacks, social engineering, and data breaches at an all-time high, terms like “cybersecurity”...
Fidelis Cybersecurity’s Network Detection and Response (NDR) with Data Loss Prevention (DLP) and Deception Provides Several Advantages for AWS VPC Traffic Mirroring
Fidelis Cybersecurity’s Network Detection and Response (NDR) with Data Loss Prevention (DLP) and Deception Provides Several Advantages for AWS VPC Traffic MirroringThe post Fidelis Cybersecurity’s Network...
The Downside to March Madness – a Busted Bracket and a Data Breach
The Downside to March Madness – a Busted Bracket and a Data BreachBack in the 1930s, March Madness was used to describe the excitement and frenzy...
USENIX Security ’22 – Varun Madathil, Alessandra Scafuro, István András Seres, Omer Shlomovits, Denis Varlakov – ‘Private Signaling’
USENIX Security ’22 – Varun Madathil, Alessandra Scafuro, István András Seres, Omer Shlomovits, Denis Varlakov – ‘Private Signaling’DISTINGUISHED PAPER AWARD WINNER Our thanks to USENIX for...
Thwarting Threats in Healthcare: The Art of Threat Hunting
Thwarting Threats in Healthcare: The Art of Threat HuntingIn the healthcare industry, protecting patient data is of the utmost importance. But with the constantly evolving threat...
Taylor Swift Tour: Let’s Analyze Cyber Risk for a Ticket Company
Taylor Swift Tour: Let’s Analyze Cyber Risk for a Ticket Company Taylor Swift starts The Eras Tour this week, let’s hope in a happy ending to...
Benefits of Real-Time Bot Detection
Benefits of Real-Time Bot DetectionFor those unaware, the bot revolution is happening right before our eyes. In fact, nearly half of all internet traffic consists of...
Phishing for Financial Fears
Phishing for Financial Fears Over the last 4 days (as of the writing of this blog) the federal government has seized the assets of […] The...
Deep web vs. dark web: What businesses should know about both
Deep web vs. dark web: What businesses should know about bothThe everyday internet presents a variety of risks for businesses and consumers. Identity theft and unauthorized...
Cancer patient sues hospital after ransomware gang leaks her nude medical photos
Cancer patient sues hospital after ransomware gang leaks her nude medical photosVictim offered two years of credit monitoring after highly sensitive records dumped online A cancer...