Source: www.schneier.com – Author: Bruce Schneier Micro-Star International—aka MSI—had its UEFI signing key stolen last month. This raises the possibility that the leaked key could push...
Day: May 15, 2023
Lacework Appoints Lea Kissner As Chief Information Security Officer – Source: www.darkreading.com
Source: www.darkreading.com – Author: 1 MOUNTAIN VIEW, Calif., May 15, 2023 /PRNewswire/ — Lacework, the data-driven cloud security company, today announced the appointment of Lea Kissner as its new Chief Information...
PharMerica Leaks 5.8M Deceased Users’ PII, Health Information – Source: www.darkreading.com
Source: www.darkreading.com – Author: Becky Bracken, Editor, Dark Reading PharMerica Healthcare has disclosed that its systems were breached earlier this year by an unauthorized third party, which...
RA Ransomware Group Emerges With Custom Spin on Babuk – Source: www.darkreading.com
Source: www.darkreading.com – Author: Tara Seals, Managing Editor, News, Dark Reading A newly discovered ransomware gang dubbed RA Group is ramping up its cyberattacks — the...
Generative AI Empowers Users but Challenges Security – Source: www.darkreading.com
Source: www.darkreading.com – Author: Michael Bargury, CTO & Co-Founder, Zenity In recent years low-code/no-code has been empowering business users to address their needs on their own,...
Breaking the DDoS Attack Loop With Rate Limiting – Source: www.darkreading.com
Source: www.darkreading.com – Author: Venkatesh Sundar, Founder, Indusface Distributed denial-of-service (DDoS) attacks are growing in frequency and sophistication thanks to the number of attack tools available...
Toyota Discloses Decade-Long Data Leak Exposing 2.15M Customers’ Data – Source: www.darkreading.com
Source: www.darkreading.com – Author: Dark Reading Staff, Dark Reading Toyota has disclosed that for more than 10 years, a misconfigured cloud bucket left more 2.15 million...
Microsoft Follina Bug Is Back in Meme-Themed Cyberattacks Against Travel Orgs – Source: www.darkreading.com
Source: www.darkreading.com – Author: Nate Nelson, Contributing Writer, Dark Reading A threat actor is exploiting last year’s Follina (RCE) remote code execution vulnerability to deploy the...
Microsoft Advisories Are Getting Worse – Source: www.darkreading.com
Source: www.darkreading.com – Author: Jacob Baines, Lead Vulnerability Researcher, VulnCheck As the 20th anniversary of Patch Tuesday approaches later this year, many are reflecting on the...
TSA Official: Feds Improved Cybersecurity Response Post-Colonial Pipeline – Source: www.darkreading.com
Source: www.darkreading.com – Author: Robert Lemos, Contributing Writer, Dark Reading In the wake of the ransomware attack on the Colonial Pipeline, the US Transportation Security Agency...
New RA Group ransomware gang is the latest group using leaked Babuk source code – Source: securityaffairs.com
Source: securityaffairs.com – Author: Pierluigi Paganini A previously unknown ransomware group known as RA Group is targeting companies in U.S. and South Korea with leaked Babuk...
Introducing the DRM-Report Q1 2023: Unveiling the Current State of Ransomware – Source: securityaffairs.com
Source: securityaffairs.com – Author: Pierluigi Paganini DRM Dashboard Ransomware Monitor released the first quarterly report for the year 2023 about the activities of ransomware groups globally....
Former Ubiquiti employee gets 6 years in jail for stealing confidential data and extorting company – Source: securityaffairs.com
Source: securityaffairs.com – Author: Pierluigi Paganini A former Ubiquiti employee has been sentenced to six years in jail for the theft of confidential data and extorting company for...
Former ByteDance executive alleges TikTok of wrongful conduct – Source: securityaffairs.com
Source: securityaffairs.com – Author: Pierluigi Paganini A former ByteDance executive revealed that the China government has access to TikTok data, including data stored in the United....
Brightly Software Notifying 3 Million SchoolDude Users of Data Breach – Source: www.securityweek.com
Source: www.securityweek.com – Author: Ionut Arghire Brightly Software last week started informing roughly three million individuals that their personal information might have been compromised in a...
Discord Informs Users of Data Breach Involving Customer Support Provider – Source: www.securityweek.com
Source: www.securityweek.com – Author: Ionut Arghire VoIP and instant messaging social platform Discord is notifying users that some of their information was compromised in a cybersecurity...
WordPress Field Builder Plugin Vulnerability Exploited in Attacks Two Days After Patch – Source: www.securityweek.com
Source: www.securityweek.com – Author: Ionut Arghire Threat actors were seen adopting public proof-of-concept (PoC) exploit code targeting a cross-site scripting (XSS) vulnerability in the Advanced Custom...
PharMerica Discloses Data Breach Impacting 5.8 Million Individuals – Source: www.securityweek.com
Source: www.securityweek.com – Author: Ionut Arghire National pharmacy network PharMerica last week started sending out notification letters to more than 5.8 million individuals to disclose a...
Capita Cyberattack Hits UK Pension Funds – Source: www.securityweek.com
Source: www.securityweek.com – Author: Eduard Kovacs The recent hacker attack aimed at UK-based business process outsourcing and professional services company Capita could impact hundreds of pension...
Philadelphia Inquirer Hit by Cyberattack Causing Newspaper’s Largest Disruption in Decades – Source: www.securityweek.com
Source: www.securityweek.com – Author: Associated Press The Philadelphia Inquirer experienced the most significant disruption to its operations in 27 years due to what the newspaper calls...
CISA: Several Old Linux Vulnerabilities Exploited in Attacks – Source: www.securityweek.com
Source: www.securityweek.com – Author: Eduard Kovacs The US Cybersecurity and Infrastructure Security Agency (CISA) has added several Linux and Linux-related flaws to its known exploited vulnerabilities...
ReversingLabs File Enrichment API for Microsoft Sentinel – Source: securityboulevard.com
Source: securityboulevard.com – Author: ReversingLabs The modern security operations center (SOC) team requires high levels of agility and accuracy to detect and respond to the latest...
Rail Security: “Unsafe at Any Speed” – Source: securityboulevard.com
Source: securityboulevard.com – Author: Kevin Kumpf A version of this article was originally published on IndustrialCyber.co. What entices me to sit down and write a blog?...
How to Know if You’ve Been Infected by Ransomware – Source: securityboulevard.com
Source: securityboulevard.com – Author: Stu Sjouwerman Detecting ransomware activity has become increasingly difficult because adversaries are constantly evolving their tools, tactics and techniques. For example, threat...
The Importance of Understanding the Unique Challenges of IT & OT Cybersecurity – Source: securityboulevard.com
Source: securityboulevard.com – Author: Sagi Kovaliov Cybersecurity threats have been increasing at an alarming rate, and organizations must continuously adapt to address these threats. The convergence...
War, Hunh. Yeah. What is it Good For? Reducing Insurer Liability for Cyberattacks – Source: securityboulevard.com
Source: securityboulevard.com – Author: Mark Rasch A New Jersey court recently ruled that an insurer was not relieved from its obligation to pay for Merck’s losses...
The Battle Against IoT Cyber Threats – Source: securityboulevard.com
Source: securityboulevard.com – Author: Dariel Marlow The rapid increase of the Internet of Things (IoT) technology has transformed the world in many ways. From home automation...
Info-Stealing Malware Populates ‘Cloud of Logs’ Offerings – Source: www.databreachtoday.com
Source: www.databreachtoday.com – Author: 1 Cybercrime , Fraud Management & Cybercrime Private Subscription Services Emerge, Together With Fresh Strains of Info Stealers Mathew J. Schwartz (euroinfosec)...
What Happens When an AI Company Falls Victim to a Software Supply Chain Vulnerability – Source: securityboulevard.com
Source: securityboulevard.com – Author: Barak Brudo An image illustrating AI goes wrong On March 20th OpenAI took down the popular generative AI tool ChatGPT for a few...