By Dr. Ken Knapton, CIO Progrexion. Credit card fraud continues to be a significant concern for both consumers and businesses. Not only can it result in...
Day: April 3, 2023
Endpoint security: Challenges, solutions and best practices
By Anas Baig, product manager and cyber security expert with Securiti. Doing business in the public sphere leaves entities open to malicious attacks. A study conducted...
GUEST ESSAY: The role advanced ‘VM’ is ideally suited to play in combating modern cyber attacks
By Chandrashekhar Basavanna Modern cyber attacks are ingenious — and traditional vulnerability management, or VM, simply is no longer very effective. Related: Taking a risk-assessment approach...
Microsoft Addresses a New Azure AD Vulnerability Affecting Bing Search & Key Apps
Microsoft has patched a misconfiguration issue affecting the Azure Active Directory (AAD) identity and access management service that allowed unauthorized access to many “high-impact” applications. The...
Elementor Pro Vulnerability Actively Exploited by Threat Actors
Threat actors are actively exploiting a high-severity vulnerability discovered in the popular plugin Elementor Pro. Elementor Pro is a WordPress page builder plugin with multiple functions...
Money Message: The Newest Ransomware Gang that Threatens Organizations
A new online threat actor has emerged: the Money Message ransomware gang. These cybercriminals are attacking companies all over the world, demanding millions of dollars in...
SCCM Alternative for Patch Management
In today’s cybersecurity space, properly patching the machines and servers in your company can make the difference between a well-secured organization and a vulnerable one. SCCM...
Cybersecurity unaligned with business goals is reactive … and flawed: Study
A new report for cybersecurity firm WithSecure suggests that most companies are investing in security solutions that are tactical and reactive, but not in line with...
BYOD and personal apps: A recipe for data breaches
Some 43% of employees have been targeted with work-related phishing attacks on their personal devices, says a survey from SlashNext. Image: Adobe Stock Employees might feel...
A Serial Tech Investment Scammer Takes Up Coding?
John Clifton Davies, a 60-year-old con man from the United Kingdom who fled the country in 2015 before being sentenced to 12 years in prison for...
The hidden danger to zero trust: Excessive cloud permissions
Graham Cluley Security News is sponsored this week by the folks at Sysdig. Thanks to the great team there for their support! What is one of...
aCropalypse now! Cropped and redacted images suffer privacy fail on Google Pixel smartphones
Graham Cluley is an award-winning security blogger, researcher and public speaker. He has been working in the computer security industry since the early 1990s. View all...
Free decryptor released for Conti-based ransomware following data leak
Security researchers have released a new decryption tool that should come to the rescue of some victims of a modified version of the Conti ransomware, helping...
Android phones can be hacked just by someone knowing your phone number
Well, this isn’t good. Google has issued a warning that some Android phones can be hacked remotely, without the intended victim having to click on anything....
Smashing Security podcast #313: Tesla twins and deepfake dramas
The twisted tale of the two Teslas, and a deepfake sandwich. All this and more is discussed in the latest edition of the “Smashing Security” podcast...
Microsoft has another go at closing security hole exploited by Magniber ransomware
Graham Cluley is an award-winning security blogger, researcher and public speaker. He has been working in the computer security industry since the early 1990s. View all...
Software supply chain attacks are on the rise — are you at risk?
Graham Cluley Security News is sponsored this week by the folks at Sysdig. Thanks to the great team there for their support! Attacks targeting the software...
STALKER 2 hacker demands Ukrainian game developer reinstates Russian language support, or else…
“STALKER 2: Heart of Chornobyl” is an action-packed video game for Windows, which sees players pitted against violent mutants and greedy thugs against a backdrop of...
FBI reveals that more money is lost to investment fraud than ransomware and business email compromise combined
Graham Cluley is an award-winning security blogger, researcher and public speaker. He has been working in the computer security industry since the early 1990s. View all...
WhatsApp and UK government on collision course, as app vows not to remove end-to-end encryption
Graham Cluley is an award-winning security blogger, researcher and public speaker. He has been working in the computer security industry since the early 1990s. View all...
Cryptocurrency companies backdoored in 3CX supply chain attack
Some of the victims affected by the 3CX supply chain attack have also had their systems backdoored with Gopuram malware, with the threat actors specifically targeting...
Capita cyberattack disrupted access to its Microsoft Office 365 apps
British outsourcing services provider Capita announced today that a cyberattack on Friday prevented access to its internal Microsoft Office 365 applications. London-based Capita employs 50,000 specialists and offers...
UK Runs Fake DDoS-for-Hire Sites
Brian Krebs is reporting that the UK’s National Crime Agency is setting up fake DDoS-for-hire sites as part of a sting operation: The NCA says all...
Western Digital discloses network breach, My Cloud service down
Western Digital announced today that its network has been breached and an unauthorized party gained access to multiple company systems. The California-based computer drive maker and...
Name That Edge Toon: Tower of Babble
We provide the cartoon. You write a witty cybersecurity-related caption to explain the scene above. Our favorite will win a $25 Amazon gift card. The contest ends on...
4 Steps for Shifting Left & Winning the Cybersecurity Battle
Customer satisfaction is today’s business battleground. The winners are the companies that deliver the best, highest-functioning software and applications in the shortest amount of time. ChatGPT...
The FDA’s Medical Device Cybersecurity Overhaul Has Real Teeth, Experts Say
The Food and Drug Administration (FDA) this week put into effect fresh guidance concerning the cybersecurity of medical devices — long a concerning area of risk...
Mimecast Report Reveals Nearly 60% of Companies in UAE and Saudi Arabia Need to Increase Cybersecurity Spending
DUBAI, UAE, March 31, 2023 /PRNewswire/ — Mimecast, an advanced email and collaboration security company, today announced the publication of its annual “The State of Email Security 2023” (SOES)...
Pro-Islam ‘Anonymous Sudan’ Hacktivists Likely a Front for Russia’s Killnet Operation
An apparently pro-Islamic group that has hit numerous targets in Europe with distributed denial of service (DDoS) attacks over the past few months may actually be...
Is Decentralized Identity About to Reach an Inflection Point?
Although the decentralized identity market is still in its infancy, it has been gaining traction in recent years and has the potential to change existing identity,...