Ferrari Announces Data Breach. Customers Risk Data LeakageOn March 20th, Ferrari announced they were victims of a cyberattack that could result in customers` data leakage. Threat...
Day: March 23, 2023
Researchers Reveal Insights into CatB Ransomware’s Advanced Evasion Methods
Researchers Reveal Insights into CatB Ransomware’s Advanced Evasion MethodsTo avoid detection and launch of the payload, threat actors behind CatB ransomware used a technique called DLL...
New PowerMagic and CommonMagic Malware Used by Threat Actors to Steal Data
New PowerMagic and CommonMagic Malware Used by Threat Actors to Steal DataA new backdoor dubbed PowerMagic and “a previously unseen malicious framework” named CommonMagic were utilized...
Another GoAnywhere Attack Affects Japanese Giant Hitachi Energy
Another GoAnywhere Attack Affects Japanese Giant Hitachi EnergyHitachi Energy confirmed that it was the victim of a data breach, part of the GoAnywhere attacks. The Clop...
ShellBot DDoS Malware Targets Poorly Managed Linux Servers
ShellBot DDoS Malware Targets Poorly Managed Linux ServersA new campaign is deploying variants of the ShellBot malware, specifically targeting poorly maintained Linux SSH servers. It seems...
The WAN Under Siege
The WAN Under SiegeWAN managers say they’re adopting zero trust security and using multiple infrastructure security vendors in response to the latest threats against the modern...
Stop Backing Up Ransomware
Stop Backing Up RansomwareBy James Gorman When utilizing cloud technology for workloads, companies often assume that their current backup strategy is sufficient for the cloud environment....
There’s no way you’re still using Consumer Messaging Apps for Business
There’s no way you’re still using Consumer Messaging Apps for BusinessBy Nicole Allen, Senior Marketing Executive, Salt Communications Consumer messaging apps are routinely utilised for business...
Top 5 Questions to Ask When You’re Building a Cloud Security Strategy
Top 5 Questions to Ask When You’re Building a Cloud Security StrategyBy Metin Kortak, chief information security officer, Rhymetec As companies began moving their computing operations...
Vulnerability Prioritization is Not a One-Size Fits All Approach
Vulnerability Prioritization is Not a One-Size Fits All ApproachBy Victor Gamra, CISSP, Founder and CEO of FortifyData System vulnerabilities are ever increasing as adoption of new...
Why Businesses Need to Leverage the NIST Post Quantum Cryptographic Standards to Fortify Their Cybersecurity Future
Why Businesses Need to Leverage the NIST Post Quantum Cryptographic Standards to Fortify Their Cybersecurity FutureBy Dr Ali El Kaafarani, Founder and CEO of PQShield July...
Remaining Proactive at Identifying Risks Keeps You Ahead of Hackers
Remaining Proactive at Identifying Risks Keeps You Ahead of HackersBy Carl Torrence, Content Marketer at Marketing Digest Why is cybersecurity such a big issue in organizations...
Ferrari Data Breach Disclosed: Attackers Gain Access to the Company’s Network While Demanding Ransom to Prevent Data Leakage
Ferrari Data Breach Disclosed: Attackers Gain Access to the Company’s Network While Demanding Ransom to Prevent Data Leakage The massive cyber incident at Ferrari that compromised...
aCropalypse now! Cropped and redacted images suffer privacy fail on Google Pixel smartphones
aCropalypse now! Cropped and redacted images suffer privacy fail on Google Pixel smartphonesHave you ever shared a photograph where you've redacted some sensitive information? Perhaps you've...
The hidden danger to zero trust: Excessive cloud permissions
The hidden danger to zero trust: Excessive cloud permissionsGraham Cluley Security News is sponsored this week by the folks at Sysdig. Thanks to the great team...
Smashing Security podcast #314: Photo cropping bombshell, TikTok debates, and real estate scams
Smashing Security podcast #314: Photo cropping bombshell, TikTok debates, and real estate scamsIt could be a case of aCropalypse now for Google Pixel users, there’s a...
US Citizen Hacked by Spyware
US Citizen Hacked by SpywareThe New York Times is reporting that a US citizen’s phone was hacked by the Predator spyware. A U.S. and Greek national...
ChatGPT Privacy Flaw
ChatGPT Privacy FlawOpenAI has disabled ChatGPT’s privacy history, almost certainly because they had a security flaw where users were seeing each others’ histories. Read MoreSchneier on...
Google Suspends Chinese E-Commerce App Pinduoduo Over Malware
Google Suspends Chinese E-Commerce App Pinduoduo Over MalwareGoogle says it has suspended the app for the Chinese e-commerce giant Pinduoduo after malware was found in versions...
4 Mobile Malware Threats You Can’t Even See
4 Mobile Malware Threats You Can’t Even See By 2030, experts predict that there will be 5 billion devices connected to 5G.1 For the general population,...
Patch CVE-2023-23397 Immediately: What You Need To Know and Do
Patch CVE-2023-23397 Immediately: What You Need To Know and DoWe break down the basic information of CVE-2023-23397, the zero-day, zero-touch vulnerability that was rated 9.8 on...
Learn cybersecurity skills by participating in real projects
Learn cybersecurity skills by participating in real projectsThese live sessions are on sale for a limited time. The post Learn cybersecurity skills by participating in real...
Ransomware gangs’ harassment of victims is increasing
Ransomware gangs’ harassment of victims is increasingThe harassment reported by Palo Alto Networks Unit 42 typically takes the form of phone calls and emails directed toward...
Report: Too many enterprises have shadow IT – unlocked doors with no cameras
Report: Too many enterprises have shadow IT – unlocked doors with no camerasNew report says far too many firms have too many IT assets they cannot...
Mozilla Firefox 111.0.1 fixes Windows 11 and macOS crashes
Mozilla Firefox 111.0.1 fixes Windows 11 and macOS crashesMozilla has addressed issues causing Firefox to crash on macOS and to freeze with a non-responding blank window...
Hackers use new PowerMagic and CommonMagic malware to steal data
Hackers use new PowerMagic and CommonMagic malware to steal dataSecurity researchers have discovered attacks from an advanced threat actor that used "a previously unseen malicious framework"...
Windows 11 Snipping Tool privacy bug exposes cropped image content
Windows 11 Snipping Tool privacy bug exposes cropped image contentA severe privacy flaw named 'acropalypse' has also been found to affect the Windows Snipping Tool, allowing...
Microsoft: Defender update behind Windows LSA protection warnings
Microsoft: Defender update behind Windows LSA protection warningsMicrosoft says the KB5007651 Microsoft Defender Antivirus update triggers Windows Security warnings on Windows 11 systems saying that Local...
Windows 10 KB5023773 preview update released with 10 fixes
Windows 10 KB5023773 preview update released with 10 fixesMicrosoft has released the optional KB5023773 Preview cumulative update for Windows 10 20H2, Windows 10 21H2, and Windows...
PoC exploits released for Netgear Orbi router vulnerabilities
PoC exploits released for Netgear Orbi router vulnerabilitiesProof-of-concept exploits for vulnerabilities in Netgear's Orbi 750 series router and extender satellites have been released, with one flaw...