Source: www.darkreading.com – Author: Tara Seals, Managing Editor, News, Dark Reading The Apple App Store supports more than 36 million registered Apple developers, but not all...
Month: May 2023
Microsoft Secure Boot Bug – Source: www.schneier.com
Source: www.schneier.com – Author: Bruce Schneier Microsoft is currently patching a zero-day Secure-Boot bug. The BlackLotus bootkit is the first-known real-world malware that can bypass Secure...
Microsoft Teams Features Amp Up Orgs’ Cyberattack Exposure – Source: www.darkreading.com
Source: www.darkreading.com – Author: Nate Nelson, Contributing Writer, Dark Reading Researchers have identified several ways hackers can leverage Microsoft Teams functionalities to phish users, or deliver...
Talking Security Strategy: Cybersecurity Has a Seat at the Boardroom Table – Source: www.darkreading.com
Source: www.darkreading.com – Author: Christopher Hentner, Chair, Panzura Customer Security Advisory Council Cybersecurity is no longer a fringe issue for businesses. What was once a siloed...
How to Protect Your Organization From Vulnerabilities – Source: www.darkreading.com
Source: www.darkreading.com – Author: 1 We live in a digital world, so there’s no shortage of threats facing organizations today. Cobalt recently released its fifth annual...
Sunday Paper Debacle: Philadelphia Inquirer Scrambles to Respond to Cyberattack – Source: www.darkreading.com
Source: www.darkreading.com – Author: Elizabeth Montalbano, Contributor, Dark Reading The city of Philadelphia’s largest newspaper couldn’t publish its Sunday edition last week due to a weekend...
I Was an RSAC Innovation Sandbox Judge — Here’s What I Learned – Source: www.darkreading.com
Source: www.darkreading.com – Author: Barmak Meftah, Co-Founder & General Partner, Ballistic Ventures It was a great honor to serve as one of five judges for this...
You may not care where you download software from, but malware does – Source: www.welivesecurity.com
Source: www.welivesecurity.com – Author: Aryeh Goretsky Why do people still download files from sketchy places and get compromised as a result? One of the pieces of...
MalasLocker ransomware targets Zimbra servers, demands charity donation – Source: www.bleepingcomputer.com
Source: www.bleepingcomputer.com – Author: Lawrence Abrams Image: Bing Create A new ransomware operation is hacking Zimbra servers to steal emails and encrypt files. However, instead of...
Cisco warns of critical switch bugs with public exploit code – Source: www.bleepingcomputer.com
Source: www.bleepingcomputer.com – Author: Sergiu Gatlan Cisco warned customers today of four critical remote code execution vulnerabilities with public exploit code affecting multiple Small Business Series...
Microsoft pulls Defender update fixing Windows LSA Protection bug – Source: www.bleepingcomputer.com
Source: www.bleepingcomputer.com – Author: Sergiu Gatlan Microsoft has pulled a recent Microsoft Defender update that was supposed to fix a known issue triggering persistent restart alerts...
Malicious Microsoft VSCode extensions steal passwords, open remote shells – Source: www.bleepingcomputer.com
Source: www.bleepingcomputer.com – Author: Bill Toulas Cybercriminals are starting to target Microsoft’s VSCode Marketplace, uploading three malicious Visual Studio extensions that Windows developers downloaded 46,600 times....
ScanSource says ransomware attack behind multi-day outages – Source: www.bleepingcomputer.com
Source: www.bleepingcomputer.com – Author: Bill Toulas Technology provider ScanSource has announced it has fallen victim to a ransomware attack impacting some of its systems, business operations, and...
FBI confirms BianLian ransomware switch to extortion only attacks – Source: www.bleepingcomputer.com
Source: www.bleepingcomputer.com – Author: Bill Toulas A joint Cybersecurity Advisory from government agencies in the U.S. and Australia, and published by the Cybersecurity and Infrastructure Security...
PaperCut vulnerability abused by several threat actors could impact 70,000 organizations – Source: www.techrepublic.com
Source: www.techrepublic.com – Author: Cedric Pernet Image: Getty Images/iStockphoto Several ransomware groups and state-sponsored cyberespionage threat actors are exploiting a vulnerability affecting printing software tools PaperCut...
Top 10 facial recognition software vendors for 2023 – Source: www.techrepublic.com
Source: www.techrepublic.com – Author: Franklin Okeke Image: Alexander/Adobe Stock Biometric security technologies such as facial recognition, are becoming more sophisticated due to the rise in cybersecurity...
Transform Any Place into a Smart Space – Source: www.techrepublic.com
Source: www.techrepublic.com – Author: Transform rooms, buildings, and spaces into assets that inform new insights, inspire collaboration, and drive efficiencies through automation and analytics. With our...
Monitoring the dark web to identify threats to energy sector organizations – Source: securityaffairs.com
Source: securityaffairs.com – Author: Pierluigi Paganini Searchlight Cyber researchers warn of threat actors that are offering on the dark web access to energy sector organizations. Dark...
US Gov offers a $10M reward for a Russian ransomware actor – Source: securityaffairs.com
Source: securityaffairs.com – Author: Pierluigi Paganini The US government is offering a $10M reward for Russian national Mikhail Pavlovich Matveev (30) charged for his role in...
Multiple flaws in Teltonika industrial cellular router expose OT networks to hack – Source: securityaffairs.com
Source: securityaffairs.com – Author: Pierluigi Paganini Experts found multiple vulnerabilities in Teltonika industrial cellular routers that could expose OT networks to cyber attacks. A joint analysis...
University admission platform Leverage EDU exposed student passports – Source: securityaffairs.com
Source: securityaffairs.com – Author: Pierluigi Paganini The popular university admission platform Leverage EDU leaked almost 240,000 sensitive files, including students’ passports, financial documents, certificates, and exam...
Lacroix Group shut down three facilities after a ‘targeted cyberattack’ – Source: securityaffairs.com
Source: securityaffairs.com – Author: Pierluigi Paganini French electronics manufacturer Lacroix Group shut down three plants after a cyber attack, experts believe it was the victim of...
U.S. Transportation Department Breach Exposes Data of 237,000 Employees – Source: heimdalsecurity.com
Source: heimdalsecurity.com – Author: Livia Gyongyoși The US Department of Transportation (USDOT) recently revealed threat actors breached its system in a cyberattack. The data breach compromised...
UNC3944 Uses Azure Serial Console for Stealthy Access to Virtual Machines – Source: heimdalsecurity.com
Source: heimdalsecurity.com – Author: Livia Gyongyoși Researchers revealed that the UNC3944 threat actors use phishing and SIM-swapping attacks to get control over Microsoft Azure admin accounts....
Capita Recommends Its Customers to Assume Their Data Was Stolen – Source: heimdalsecurity.com
Source: heimdalsecurity.com – Author: Madalina Popovici At the end of March, a cyberattack affected Capita’s systems, resulting in the theft of customer data. Six weeks after...
No more macros? No problem, say miscreants, we’ll adapt – Source: www.proofpoint.com
Source: www.proofpoint.com – Author: 1 Microsoft’s decision to block internet-sourced macros by default last year is forcing attackers to find new and creative ways to compromise...
Cybercriminals have adapted since Microsoft’s decision to block macros – Source: www.proofpoint.com
Source: www.proofpoint.com – Author: 1 Microsoft’s decision to disable macros by default has resulted in “vastly different … attack chains” from cybercriminals and a “new normal...
CISO anxiety returns amid heightened concern of material cyberattacks – Source: www.proofpoint.com
Source: www.proofpoint.com – Author: 1 Dive Brief: After a year of relative calm, more than two-thirds of CISOs across the globe are concerned about a material...
Cybersecurity stress returns after a brief calm: Proofpoint report – Source: www.proofpoint.com
Source: www.proofpoint.com – Author: 1 Sixty-eight percent of CISOs globally fear a cyberattack in the next 12 months, up by over 40% year over year and...
Getting a Tighter Grip on Supply Chain Security Risk – Source: www.proofpoint.com
Source: www.proofpoint.com – Author: 1 3rd Party Risk Management , Events , Governance & Risk Management Proofpoint CEO Ashan Willy on Ways to Identify Third-Party Compromises...




























