Threat actors abuse Adobe Acrobat Sign to distribute RedLine info-stealerThreat actors are abusing the legitimate Adobe Acrobat Sign service to distribute the RedLine information stealer. Avast...
Day: March 20, 2023
HinataBot: The Latest Go-based Threat Is Launching DDoS Attacks
HinataBot: The Latest Go-based Threat Is Launching DDoS AttacksIn January, a Go-based botnet named HinataBot (named after the character from the popular anime series Naruto) was...
Emotet Malware Spreads Out Through Malicious Microsoft OneNote Attachments
Emotet Malware Spreads Out Through Malicious Microsoft OneNote AttachmentsEmotet malware returns after three months break and uses Microsoft OneNote attachments to avoid macro-based security restrictions. Threat...
A Cancer Patient’s Fight for Justice Against a Hospital Ransomware Attack
A Cancer Patient’s Fight for Justice Against a Hospital Ransomware AttackA cancer patient whose naked medical photos and records were stolen by a ransomware gang and...
SOC Prime Threat Bounty — February 2023 Results
SOC Prime Threat Bounty — February 2023 Results Threat Bounty Publications In February 2023, members of the Threat Bounty Program significantly contributed to the SOC Prime...
Why You Should Opt Out of Sharing Data With Your Mobile Provider
Why You Should Opt Out of Sharing Data With Your Mobile ProviderA new breach involving data from nine million AT&T customers is a fresh reminder that...
S4x23 Review Part 3: Healthcare Cybersecurity Sessions
S4x23 Review Part 3: Healthcare Cybersecurity SessionsThis article focuses on the healthcare sector. Over the past two years, the healthcare sector has been in a constant...
First Dero cryptojacking campaign targets unprotected Kubernetes instances
First Dero cryptojacking campaign targets unprotected Kubernetes instancesLearn how this cryptocurrency campaign operates and its scope. Then, get tips on protecting vulnerable Kubernetes instances from this...
Running WordPress on Azure for secure, fast and global content delivery
Running WordPress on Azure for secure, fast and global content deliveryLearn about Microsoft's WordPress on Azure App Service, as well as an interesting alternative from WP...
Google Pixel flaw allowed recovery of redacted, cropped images
Google Pixel flaw allowed recovery of redacted, cropped imagesAn 'Acropalypse' flaw in Google Pixel's Markup tool made it possible to partially recover edited or redacted screenshots...
Hackers mostly targeted Microsoft, Google, Apple zero-days in 2022
Hackers mostly targeted Microsoft, Google, Apple zero-days in 2022Hackers continue to target zero-day vulnerabilities in malicious campaigns, with researchers reporting that 55 zero-days were actively exploited...
Is your organization among the 1 in 10 with malware traffic? DNS data reveals scary truth
Is your organization among the 1 in 10 with malware traffic? DNS data reveals scary truthEXECUTIVE SUMMARY: In a new report, cyber security researchers have highlighted...
GUEST ESSAY: Scammers leverage social media, clever con games to carry out digital exploitation
GUEST ESSAY: Scammers leverage social media, clever con games to carry out digital exploitationOne common misconception is that scammers usually possess a strong command of computer...
How an AI voice clone fooled Centrelink – video
How an AI voice clone fooled Centrelink – videoAn investigation by Guardian Australia has found that AI technology is able to fool a voice identification system...
Is Your Identity Management Comprehensive Enough? Are You Just Tipping Your Toes?
Is Your Identity Management Comprehensive Enough? Are You Just Tipping Your Toes?Post ContentRead MoreDataBreachToday.com RSS Syndication
Impact of Technology Deployments on Privacy: Striking the Right Balance
Impact of Technology Deployments on Privacy: Striking the Right BalancePost ContentRead MoreDataBreachToday.com RSS Syndication
Future of Cybersecurity: Threats and Opportunities
Future of Cybersecurity: Threats and OpportunitiesPost ContentRead MoreDataBreachToday.com RSS Syndication
It’s Raining Zero-Days in Cyberspace
It's Raining Zero-Days in CyberspaceChinese Hackers and Others Increasingly Favor Unpatched VulnerabilitiesLast year was another bonanza in zero-days for Chinese state hackers, say security researchers in...
Roseville, Calif., CIO Brings Global Background to Local Gov
Roseville, Calif., CIO Brings Global Background to Local GovHong Sae is the CIO for the city of Roseville, Calif., and he has a tremendous track record...
TikTok cannot be considered a private company, says Australian report
TikTok cannot be considered a private company, says Australian reportALSO: Japan ends chip supply crimp on South Korea, APAC infosec spending surges; Philippines SIM registration stalls...
Lowe’s Market chain leaves client data up for grabs
Lowe’s Market chain leaves client data up for grabsA misconfiguration on a website owned by the US-based Lowe’s Market grocery store chain could have allowed threat...
Security Affairs newsletter Round 411 by Pierluigi Paganini
Security Affairs newsletter Round 411 by Pierluigi PaganiniA new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from Security Affairs are...
New ‘HinataBot’ botnet could launch massive 3.3 Tbps DDoS attacks
New ‘HinataBot’ botnet could launch massive 3.3 Tbps DDoS attacksA new malware botnet was discovered targeting Realtek SDK, Huawei routers, and Hadoop YARN servers to recruit...
Cybersecurity funds should go towards beefing up Centrelink voice authentication, Greens say
Cybersecurity funds should go towards beefing up Centrelink voice authentication, Greens sayDavid Shoebridge says some of the $10bn allocated to Redspice program should counter misuse of...