Over 70% of Employees Keep Work Passwords on Personal Devices95% of security leaders are also concerned about phishing attacks via private messaging appsRead More95% of security...
Day: March 30, 2023
North Korean Hackers Use Trojanized 3CX DesktopApp in Supply Chain Attacks
North Korean Hackers Use Trojanized 3CX DesktopApp in Supply Chain AttacksWindows and Mac versions of the software were compromised to deliver infostealersRead MoreWindows and Mac versions...
New Mélofée Linux malware linked to Chinese APT groups
New Mélofée Linux malware linked to Chinese APT groupsExatrack researchers warn of an unknown China-linked hacking group that has been linked to a new Linux malware,...
3CX voice and video conferencing software victim of a supply chain attack
3CX voice and video conferencing software victim of a supply chain attackPopular voice and video conferencing software 3CX was the victim of a supply chain attack,...
The U.K. Police Hunts Cybercriminals with Fake DDoS-as-a-service Sites
The U.K. Police Hunts Cybercriminals with Fake DDoS-as-a-service SitesThe National Crime Agency (NCA) from the U.K. launched several fake DDoS-as-a-service sites. The aim is to gather...
APT43: A New Cyberthreat From North Korea
APT43: A New Cyberthreat From North KoreaA new North Korean cyber operator has been attributed to a series of attacks conducted to gather strategic intelligence aligned...
What Is User Provisioning?
What Is User Provisioning?User provisioning (also known as account provisioning) is a digital Identity and Access Management (IAM) process that involves creating employee/user accounts and their...
Companies Affected by Ransomware [2022-2023]
Companies Affected by Ransomware [2022-2023]The increasing frequency and size of ransomware attacks are becoming a huge concern for thousands of organizations globally. All over the world,...
Detect CVE-2022-47986 Exploits: Critical Pre-Authenticated Remote Code Execution Vulnerability in IBM Aspera Faspex
Detect CVE-2022-47986 Exploits: Critical Pre-Authenticated Remote Code Execution Vulnerability in IBM Aspera Faspex Stay alert! Adversaries set eyes on Aspena Faspex, an IBM file-exchange application frequently...
US sends million-dollar scammer to prison for four years
US sends million-dollar scammer to prison for four years31-year-old Solomon Ekunke Okpe, of Lagos, was a member of a gang that devised and executed a variety...
Clipboard-injecting malware disguises itself as Tor browser, steals cryptocurrency
Clipboard-injecting malware disguises itself as Tor browser, steals cryptocurrencyMalware, disguised as copies of Tor, has stolen approximately US $400,000 worth of cryptocurrency from almost 16,000 users...
Mac Malware MacStealer Spreads as Fake P2E Apps
Mac Malware MacStealer Spreads as Fake P2E AppsWe detected Mac malware MacStealer spreading via websites, social media, and messaging platforms Twitter, Discord, and Telegram. Cybercriminals lure...
New AlienFox toolkit steals credentials for 18 cloud services
New AlienFox toolkit steals credentials for 18 cloud servicesA new modular toolkit called 'AlienFox' allows threat actors to scan for misconfigured servers to steal authentication secrets...
Bing search results hijacked via misconfigured Microsoft app
Bing search results hijacked via misconfigured Microsoft appA misconfigured Microsoft application allowed anyone to log in and modify Bing.com search results in real-time, as well as inject...
Why AI is becoming more powerful: Implications for business & society
Why AI is becoming more powerful: Implications for business & societyProfessional bio: Micki Boland is a global cyber security warrior and evangelist with Check Point’s Office...
‘Vulkan files’ leak reveals Putin’s global and domestic cyberwarfare tactics
‘Vulkan files’ leak reveals Putin’s global and domestic cyberwarfare tactics• Documents leaked by whistleblower angry over Ukraine war • Private Moscow consultancy bolstering Russian cyberwarfare •...
Cyberwarfare leaks show Russian army is adopting mindset of secret police
Cyberwarfare leaks show Russian army is adopting mindset of secret policeDocuments leaked from Vulkan cybersecurity firm also raise questions about role of IT engineers behind information-control...
Panel Discussion | Partnering for Better Cloud Security: Enhanced Threat Detection and Response
Panel Discussion | Partnering for Better Cloud Security: Enhanced Threat Detection and ResponsePost ContentRead MoreDataBreachToday.com RSS Syndication
Phishing Campaign Tied to Russia-Aligned Cyberespionage
Phishing Campaign Tied to Russia-Aligned CyberespionageUS and European Officials Among the Targets of TA473/Winter Vivern, Researchers SayA hacking group with apparent ties to Russia or Belarus...
Will Customer Refunds for Scams Trigger First-Party Fraud?
Will Customer Refunds for Scams Trigger First-Party Fraud?M&T Bank's Karen Boyer on Why First-Party Fraud Is Hard for Banks to DetectThe U.S. Consumer Financial Protection Bureau...
Ransomware Groups Hit Unpatched IBM File Transfer Software
Ransomware Groups Hit Unpatched IBM File Transfer SoftwareBuhti and IceFire Ransom Groups Tied to Attacks Targeting Vulnerable ServersSecurity experts are urging users of IBM's Aspera Faspex...
Dark Power, nuevo ransomware activo
Dark Power, nuevo ransomware activoHa aparecido una nueva operación de ransomware llamada «Dark Power», y ya ha enumerado a sus primeras víctimas en un […]Read MoreBlog...
IOTW: Latitude Financial data breach affects 14 million people
IOTW: Latitude Financial data breach affects 14 million peopleThe data stolen included personal information such as passport and Medicare numbersRead MoreCategories RSS FeedThe data stolen included...
Seven Types of Customer Authentication Methods
Seven Types of Customer Authentication Methods Customer identity and access management (CIAM) is a major cybersecurity component of any company that maintains customer accounts. Online fraud...
Do you trust AI to find app sec holes while you sleep?
Do you trust AI to find app sec holes while you sleep? The post Do you trust AI to find app sec holes while you sleep?...
Leveraging Generative AI for Cybersecurity: Introducing Flare’s AI Powered Assistant
Leveraging Generative AI for Cybersecurity: Introducing Flare’s AI Powered AssistantThe world is changing with generative AI. And your threat intelligence platform is too. We’re thrilled to...
Malware disguised as Tor browser steals $400k in cryptocash
Malware disguised as Tor browser steals $400k in cryptocashBeware of third party downloads Clipboard-injector malware disguised as Tor browser installers has been used to steal about...
Smugglers busted sneaking tech into China
Smugglers busted sneaking tech into China'Intel inside' a suspiciously baggy t-shirt gave the game away – as did a truckload of parts International Talk Like a...
Another year, another North Korean malware-spreading, crypto-stealing gang named
Another year, another North Korean malware-spreading, crypto-stealing gang namedMandiant identifies 'moderately sophisticated' but 'prolific' APT43 as global menace Google Cloud's recently acquired security outfit Mandiant has...
Noname Security releases API security updates
Noname Security releases API security updatesAPI security vendor Noname Security today announced a new release of its platform, with a number of upgrades designed to enhance...