The inconspicuous office is in Moscow’s north-eastern suburbs. A sign reads: “Business centre”. Nearby are modern residential blocks and a rambling old cemetery, home to ivy-covered...
Month: April 2023
TechScape: How the world is turning against social media
Government workers in the UK, US, Canada and European Union (the list will have grown by the time you read this) are banned from installing TikTok...
Yes, it’s crazy to have TikTok on official phones. But it’s not good for any of us | John Naughton
As of this moment, government officials in 11 countries are forbidden to run TikTok on their government-issued phones. The countries include the US, Canada, Denmark, Belgium,...
TikTok banned on London City Hall devices over security concerns
London City Hall staff will no longer have TikTok on their devices in the latest ban imposed on the Chinese-owned social media app over security concerns....
TikTok to be banned from UK parliamentary devices
Parliament is to ban the Chinese-owned video-sharing app TikTok from “all parliamentary devices and the wider parliamentary network”, citing the need for cybersecurity. The move goes...
BBC urges staff to delete TikTok from company mobile phones
The BBC has urged its staff to delete the Chinese-own social media app TikTok from corporate mobile phones. Guidance to BBC staff circulated on Sunday said:...
Why is TikTok banned from government phones – and should the rest of us be worried?
TikTok is wildly popular, with more than 1 billion people consuming its short video posts around the world. But the app is less favoured by politicians...
The TikTok wars – why the US and China are feuding over the app
TikTok is once again fending off claims that its Chinese parent company, ByteDance, would share user data from its popular video-sharing app with the Chinese government,...
MPs and peers ask information commissioner to investigate TikTok
A cross-party group of MPs and peers have asked the information commissioner to investigate whether the Chinese-owned TikTok’s handling of personal information is in breach of...
The FDA’s Medical Device Cybersecurity Overhaul Has Real Teeth, Experts Say
The Food and Drug Administration (FDA) this week put into effect fresh guidance concerning the cybersecurity of medical devices — long a concerning area of risk...
The FDA’s Medical Device Cybersecurity Overhaul Has Real Teeth, Experts Say
The Food and Drug Administration (FDA) this week put into effect fresh guidance concerning the cybersecurity of medical devices — long a concerning area of risk...
The FDA’s Medical Device Cybersecurity Overhaul Has Real Teeth, Experts Say
The Food and Drug Administration (FDA) this week put into effect fresh guidance concerning the cybersecurity of medical devices — long a concerning area of risk...
New Money Message ransomware demands million dollar ransoms
A new ransomware gang named ‘Money Message’ has appeared, targeting victims worldwide and demanding million-dollar ransoms not to leak data and release a decryptor. The new...
Fake ransomware gang targets U.S. orgs with empty data leak threats
Fake extortionists are piggybacking on data breaches and ransomware incidents, threatening U.S. companies with publishing or selling allegedly stolen data unless they get paid. Sometimes the...
DISH slapped with multiple lawsuits after ransomware cyber attack
Dish Network has been slapped with multiple class action lawsuits after it suffered a ransomware incident that was behind the company’s multi-day “network outage.” These class action lawsuits,...
Twitter open-sources recommendation algorithm code
Twitter announced on Friday that it’s open-sourcing the code behind the recommendation algorithm the platform uses to select the contents of the users’ For You timeline....
15 million public-facing services vulnerable to CISA KEV flaws
Over 15 million publicly facing services are susceptible to at least one of the 896 vulnerabilities listed in CISA’s KEV (known exploitable vulnerabilities) catalog. This massive...
Hackers exploit bug in Elementor Pro WordPress plugin with 11M installs
Hackers are actively exploiting a high-severity vulnerability in the popular Elementor Pro WordPress plugin used by over eleven million websites. Elementor Pro is a WordPress page...
10-year-old Windows bug with ‘opt-in’ fix exploited in 3CX attack
A 10-year-old Windows vulnerability is still being exploited in attacks to make it appear that executables are legitimately signed, with the fix from Microsoft still “opt-in”...
Consumer lender TMX discloses data breach impacting 4.8 million people
TMX Finance and its subsidiaries TitleMax, TitleBucks, and InstaLoan have collectively disclosed a data breach that exposed the personal data of 4,822,580 customers. TitleMax is a...
Winter Vivern hackers exploit Zimbra flaw to steal NATO emails
A Russian hacking group tracked as TA473, aka ‘Winter Vivern,’ has been actively exploiting vulnerabilities in unpatched Zimbra endpoints since February 2023 to steal the emails...
Microsoft OneNote will block 120 dangerous file extensions
Microsoft has shared more information on what malicious embedded files OneNote will soon block to defend users against ongoing phishing attacks pushing malware. The company first...
New Money Message ransomware demands million dollar ransoms
New Money Message ransomware demands million dollar ransomsA new ransomware gang named 'Money Message' has appeared, targeting victims worldwide and demanding million-dollar ransoms not to leak...
Is ChatGPT A Silver Bullet For Cybercriminals?
Is ChatGPT A Silver Bullet For Cybercriminals?Post ContentRead MoreProofpoint News Feed
New IcedID variants shift from bank fraud to malware delivery
New IcedID variants shift from bank fraud to malware deliveryPost ContentRead MoreProofpoint News Feed
Pro-Russian hackers target elected US officials supporting Ukraine
Pro-Russian hackers target elected US officials supporting UkrainePost ContentRead MoreProofpoint News Feed
Think ransomware gangs won’t thrive this year? Think again, experts say
Think ransomware gangs won't thrive this year? Think again, experts sayPost ContentRead MoreProofpoint News Feed
Cisco Secure Network Analytics Remote Code Execution Vulnerability
Cisco Secure Network Analytics Remote Code Execution VulnerabilityA vulnerability in the web-based management interface of Cisco Secure Network Analytics, formerly Cisco Stealthwatch Enterprise, could allow an...
Cisco Application Policy Infrastructure Controller and Cisco Cloud Network Controller Cross-Site Request Forgery Vulnerability
Cisco Application Policy Infrastructure Controller and Cisco Cloud Network Controller Cross-Site Request Forgery VulnerabilityA vulnerability in the web-based management interface of Cisco Application Policy Infrastructure Controller...
Embedded vSphere Harbor default enablement results in an insecure configuration
Embedded vSphere Harbor default enablement results in an insecure configurationThis post is relevant to administrators that have enabled the embedded Harbor version in vSphere 7.0 or...
























