Source: www.govinfosecurity.com – Author: 1 Email Security & Protection , Fraud Management & Cybercrime , Next-Generation Technologies & Secure Development Acquisitive Startup Buys Cyren’s Threat Intel,...
Day: May 18, 2023
Aviatrix is transforming cloud network security with distributed firewalling – Source: www.csoonline.com
Source: www.csoonline.com – Author: The new distributed cloud firewall offering distributes both inspection and policy enforcement into the original path of application traffic, eliminating the need...
Russian national indicted for ransomware attacks against the US – Source: www.csoonline.com
Source: www.csoonline.com – Author: Mikhail Pavlovich Matveev is charged with conspiring to transmit ransom demands, conspiring to damage protected computers, and intentionally damaging protected computers. Metamorworks...
US offers $10m bounty for Russian ransomware suspect outed in indictment – Source: nakedsecurity.sophos.com
Source: nakedsecurity.sophos.com – Author: Naked Security writer He goes by many names, according to the US Department of Justice. Mikhail Pavlovich Matveev, or just plain Matveev...
Lemon Group Uses Millions of Pre-Infected Android Phones to Enable Cybercrime Enterprise – Source: www.darkreading.com
Source: www.darkreading.com – Author: Jai Vijayan, Contributing Writer, Dark Reading Millions of Android phone users around the world are contributing daily to the financial wellbeing of...
5 Ways Security Testing Can Aid Incident Response – Source: www.darkreading.com
Source: www.darkreading.com – Author: David Dunn, Senior Managing Director and Head of EMEA Cybersecurity, FTI Consulting The importance for organizations to understand who their adversaries are...
BianLian Cybercrime Group Changes Up Extortion Methods, Warns CISA – Source: www.darkreading.com
Source: www.darkreading.com – Author: Dark Reading Staff, Dark Reading In an advisory this week, the US Cybersecurity and Infrastructure Security Agency (CISA) alongside the Federal Bureau...
Houthi-Backed Spyware Effort Targets Yemen Aid Workers – Source: www.darkreading.com
Source: www.darkreading.com – Author: Dark Reading Staff, Dark Reading An ongoing spyware campaign is targeting attendees of Saudi government-led negotiations on Yemen, along with humanitarian and...
Apple Boots a Half-Million Developers From Official App Store – Source: www.darkreading.com
Source: www.darkreading.com – Author: Tara Seals, Managing Editor, News, Dark Reading The Apple App Store supports more than 36 million registered Apple developers, but not all...
Microsoft Teams Features Amp Up Orgs’ Cyberattack Exposure – Source: www.darkreading.com
Source: www.darkreading.com – Author: Nate Nelson, Contributing Writer, Dark Reading Researchers have identified several ways hackers can leverage Microsoft Teams functionalities to phish users, or deliver...
Microsoft Secure Boot Bug – Source: www.schneier.com
Source: www.schneier.com – Author: Bruce Schneier Microsoft is currently patching a zero-day Secure-Boot bug. The BlackLotus bootkit is the first-known real-world malware that can bypass Secure...
Talking Security Strategy: Cybersecurity Has a Seat at the Boardroom Table – Source: www.darkreading.com
Source: www.darkreading.com – Author: Christopher Hentner, Chair, Panzura Customer Security Advisory Council Cybersecurity is no longer a fringe issue for businesses. What was once a siloed...
How to Protect Your Organization From Vulnerabilities – Source: www.darkreading.com
Source: www.darkreading.com – Author: 1 We live in a digital world, so there’s no shortage of threats facing organizations today. Cobalt recently released its fifth annual...
Sunday Paper Debacle: Philadelphia Inquirer Scrambles to Respond to Cyberattack – Source: www.darkreading.com
Source: www.darkreading.com – Author: Elizabeth Montalbano, Contributor, Dark Reading The city of Philadelphia’s largest newspaper couldn’t publish its Sunday edition last week due to a weekend...
I Was an RSAC Innovation Sandbox Judge — Here’s What I Learned – Source: www.darkreading.com
Source: www.darkreading.com – Author: Barmak Meftah, Co-Founder & General Partner, Ballistic Ventures It was a great honor to serve as one of five judges for this...
You may not care where you download software from, but malware does – Source: www.welivesecurity.com
Source: www.welivesecurity.com – Author: Aryeh Goretsky Why do people still download files from sketchy places and get compromised as a result? One of the pieces of...
MalasLocker ransomware targets Zimbra servers, demands charity donation – Source: www.bleepingcomputer.com
Source: www.bleepingcomputer.com – Author: Lawrence Abrams Image: Bing Create A new ransomware operation is hacking Zimbra servers to steal emails and encrypt files. However, instead of...
Cisco warns of critical switch bugs with public exploit code – Source: www.bleepingcomputer.com
Source: www.bleepingcomputer.com – Author: Sergiu Gatlan Cisco warned customers today of four critical remote code execution vulnerabilities with public exploit code affecting multiple Small Business Series...
Microsoft pulls Defender update fixing Windows LSA Protection bug – Source: www.bleepingcomputer.com
Source: www.bleepingcomputer.com – Author: Sergiu Gatlan Microsoft has pulled a recent Microsoft Defender update that was supposed to fix a known issue triggering persistent restart alerts...
Malicious Microsoft VSCode extensions steal passwords, open remote shells – Source: www.bleepingcomputer.com
Source: www.bleepingcomputer.com – Author: Bill Toulas Cybercriminals are starting to target Microsoft’s VSCode Marketplace, uploading three malicious Visual Studio extensions that Windows developers downloaded 46,600 times....
ScanSource says ransomware attack behind multi-day outages – Source: www.bleepingcomputer.com
Source: www.bleepingcomputer.com – Author: Bill Toulas Technology provider ScanSource has announced it has fallen victim to a ransomware attack impacting some of its systems, business operations, and...
FBI confirms BianLian ransomware switch to extortion only attacks – Source: www.bleepingcomputer.com
Source: www.bleepingcomputer.com – Author: Bill Toulas A joint Cybersecurity Advisory from government agencies in the U.S. and Australia, and published by the Cybersecurity and Infrastructure Security...