Source: www.bleepingcomputer.com – Author: Sergiu Gatlan Microsoft is investigating service issues preventing users from accessing their Microsoft 365 accounts and blocking access to installed apps. The...
Day: May 23, 2023
Malicious Windows kernel drivers used in BlackCat ransomware attacks – Source: www.bleepingcomputer.com
Source: www.bleepingcomputer.com – Author: Bill Toulas The ALPHV ransomware group (aka BlackCat) was observed employing signed malicious Windows kernel drivers to evade detection by security software...
Enterprises Must Prepare Now for Shorter TLS Certificate Lifespans – Source: www.darkreading.com
Source: www.darkreading.com – Author: Ulrich Wisser, Head of Security Research, Red Sift On March 3, Google (under the guise of The Chromium Projects, which it controls)...
Improving Cybersecurity Requires Building Better Public-Private Cooperation – Source: www.darkreading.com
Source: www.darkreading.com – Author: Sue Poremba, Contributing Writer Cyber threats have a long reach. What seems like a low-level cyber incident can have a larger ripple...
PyPI Shuts Down Over the Weekend, Says Incident Was Overblown – Source: www.darkreading.com
Source: www.darkreading.com – Author: Nate Nelson, Contributing Writer, Dark Reading Following a temporary suspension of all new users and package uploads, the Python Package Index (PyPI)...
Meta Hit With $1.3B Record-Breaking Fine for GDPR Violations – Source: www.darkreading.com
Source: www.darkreading.com – Author: Dark Reading Staff, Dark Reading Meta, owner of Facebook and Instagram, has been fined $1.3 billion (€1.2 billion) for violating the European...
Meet the GoldenJackal APT group. Don’t expect any howls – Source: securelist.com
Source: securelist.com – Author: Giampaolo Dedola GoldenJackal is an APT group, active since 2019, that usually targets government and diplomatic entities in the Middle East and...
Cutting Through the Noise: What is Zero Trust Security? – Source: www.securityweek.com
Source: www.securityweek.com – Author: Marie Hattar The Zero Trust framework has emerged as the leading security protocol for complex enterprises. According to ZTEdge, 80% of organizations...
Chinese state-sponsored attack uses custom router implant to target European governments – Source: www.techrepublic.com
Source: www.techrepublic.com – Author: Cedric Pernet Image: ArtemisDiana/Adobe Stock Check Point Research released a new report that exposes the activities of a Chinese state-sponsored APT threat...
How to manage and share files online using NordLocker – Source: www.techrepublic.com
Source: www.techrepublic.com – Author: Lance Whitney With NordLocker, you can store, manage and share individual files. Learn how with this step-by-step guide. Image: Thapana_Studio/Adobe Stock If...
How and why to use multiple Apple IDs on the same Mac – Source: www.techrepublic.com
Source: www.techrepublic.com – Author: Erik Eckel There are a few reasons Apple users should sometimes employ a pair of Apple IDs on the same Mac. Here’s...
Report: More organizations still plan to increase their tech staff – Source: www.techrepublic.com
Source: www.techrepublic.com – Author: Esther Shein A new Linux Foundation report finds that the global focus is on cloud/containers, cybersecurity and AI/ML skills, and that upskilling...
Samsung Patches Memory Address Randomization Bypass Flaw – Source: www.govinfosecurity.com
Source: www.govinfosecurity.com – Author: 1 Endpoint Security , Governance & Risk Management , Patch Management Flaw Was Exploited in Chain of Zero-Days Used to Implant Commercial...
iSpoof Admin Gets Up to 13 Years in 115M Euro Vishing Fraud – Source: www.govinfosecurity.com
Source: www.govinfosecurity.com – Author: 1 Cybercrime , Fraud Management & Cybercrime , Social Engineering Tejay Fletcher Made It Easy for Scammers to Impersonate Phone Numbers Rashmi...
Live Webinar | The Secret Sauce to Secrets Management – Source: www.govinfosecurity.com
Source: www.govinfosecurity.com – Author: 1 Itzik Alvas CEO and Co-founder, Entro Security tzik has 15+ years of R&D and management experience. He started his career as...
China Bans Micron Chip Sales – Source: www.govinfosecurity.com
Source: www.govinfosecurity.com – Author: 1 Endpoint Security , Hardware / Chip-level Security Micron Says It Is Surprised by the Chinese Cyberspace Administration’s Decision Jayant Chakravarti (@JayJay_Tech)...
Federal Lawsuits in Fortra Health Data Breach Piling Up – Source: www.govinfosecurity.com
Source: www.govinfosecurity.com – Author: 1 Governance & Risk Management , Legislation & Litigation , Patch Management Several Proposed Class Actions Filed Against NationsBenefits, Aetna, Others Marianne...
Interview With a Crypto Scam Investment Spammer – Source: krebsonsecurity.com
Source: krebsonsecurity.com – Author: BrianKrebs Social networks are constantly battling inauthentic bot accounts that send direct messages to users promoting scam cryptocurrency investment platforms. What follows...
M&S and Diageo pension schemes exposed in Capita hack – Source: grahamcluley.com
Source: grahamcluley.com – Author: Graham Cluley If you have a pension scheme with Marks and Spencer or Diageo your personal details may have fallen into the...
CISA adds iPhone bugs to its Known Exploited Vulnerabilities catalog – Source: securityaffairs.com
Source: securityaffairs.com – Author: Pierluigi Paganini US CISA added three zero-day vulnerabilities affecting iPhones, Macs, and iPads to its Known Exploited Vulnerabilities catalog. US Cybersecurity and Infrastructure...
EU hits Meta with $1.3 billion fine for transferring European user data to the US – Source: securityaffairs.com
Source: securityaffairs.com – Author: Pierluigi Paganini The European Union condemned Meta with a record $1.3 billion fine for transferring European user data to the US. The European Union...
Dish Network says the February ransomware attack impacted +300,000 individuals – Source: securityaffairs.com
Source: securityaffairs.com – Author: Pierluigi Paganini Satellite TV giant Dish Network disclosed a data breach after the February ransomware attack and started notifying impacted individuals. The...
China bans chip maker Micron from its key information infrastructure – Source: securityaffairs.com
Source: securityaffairs.com – Author: Pierluigi Paganini The Chinese government announced the ban on the products made by the US memory chip giant Micron Technology over national...
BatLoader campaign impersonates ChatGPT and Midjourney to deliver Redline Stealer – Source: securityaffairs.com
Source: securityaffairs.com – Author: Pierluigi Paganini Researchers identified an ongoing BatLoader campaign relying on Google Search Ads to deliver rogue web pages for ChatGPT and Midjourney....
Meta fined $1.3B for violating EU GDPR data transfer rules on privacy – Source: www.csoonline.com
Source: www.csoonline.com – Author: The Irish Data Protection Commission has levied a record-breaking fine against Facebook’s parent company, Meta, for transferring data to the US without...
Microsoft reports jump in business email compromise activity – Source: www.csoonline.com
Source: www.csoonline.com – Author: Thirty-five million business email compromise (BEC) attempts were detected in the last year, according to the latest Microsoft Cyber Signals report.
BrandPost: Combining threat intelligence, data at scale, and AI to fortify cyber defenses – Source: www.csoonline.com
Source: www.csoonline.com – Author: About | When you have comprehensive security, the future is yours to build. Learn about the strategies and solutions to secure your...
What cybersecurity professionals can learn from the humble ant – Source: www.csoonline.com
Source: www.csoonline.com – Author: When ants work together to defend their colony, it’s all for one and one for all. This model could help forge an...