Source: www.infosecurity-magazine.com – Author: 1 UK communications regulator Ofcom has become the latest organization to be impacted by the Clop extortion campaign targeting a zero-day bug...
Day: June 13, 2023
Historic Zacks Breach Impacts Nearly Nine Million – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: 1 Security researchers have discovered a breach at Zacks Investment Research dating all the way back to 2020, which appears to have...
Why Critical Infrastructure Remains a Ransomware Target – Source: www.darkreading.com
Source: www.darkreading.com – Author: Joe Stewart, Principal Security Researcher, eSentire There continues to be a lot of pressure on security leaders to do more with less,...
Researchers Report First Instance of Automated SaaS Ransomware Extortion – Source: www.darkreading.com
Source: www.darkreading.com – Author: Jai Vijayan, Contributing Writer, Dark Reading The 0mega ransomware group has successfully pulled off an extortion attack against a company’s SharePoint Online...
New Loader Delivering Spyware via Image Steals Cryptocurrency Info – Source: www.darkreading.com
Source: www.darkreading.com – Author: Nate Nelson, Contributing Writer, Dark Reading A sophisticated attack by Russian-language actors is using a novel loader and malware-laced PNG image file...
DDoS threats and defense: How certain assumptions can lead to an attack – Source: www.techrepublic.com
Source: www.techrepublic.com – Author: Jag Bains Image: iStockphoto/stevanovicigor Jump to: Why ‘blackholing’ is no longer sufficient as a strategy Outsourcing DDoS protection poses dangerous risks Cybersecurity...
Google’s ChromeOS aims for enterprise with security and compatibility – Source: www.techrepublic.com
Source: www.techrepublic.com – Author: Karl Greenberg Adobe Stock by: Monticellllo During the Google I/O event last month, the global tech giant showed off new elements of...
Equipment reassignment checklist – Source: www.techrepublic.com
Source: www.techrepublic.com – Author: © 2023 TechnologyAdvice. All Rights Reserved. Payment Information Address Line 1 Address Line 2 (Optional) Country Enter Promo Code (Optional) Your total...
DDoS attacks launched against Swiss websites ahead of Zelensky address
Swiss government websites were taken offline through the use of targeted distributed-denial-of-service (DDoS) attacks ahead of a video address by Ukranian President, Volodymyr Zelensky. DDoS attacks...
E-Commerce Firms Are Top Targets for API, Web Apps Attacks – Source: www.databreachtoday.com
Source: www.databreachtoday.com – Author: 1 API Security , Application Security , Next-Generation Technologies & Secure Development Akamai: Rapid Digitalization, Flawed Code Led to 14 Billion Attacks...
Expel Lays Off 10% of Workers 8 Months After Hauling in $31M – Source: www.databreachtoday.com
Source: www.databreachtoday.com – Author: 1 Managed Detection & Response (MDR) , Security Operations 60 Staffers Axed Months After Expel Slowed Hiring to Reduce Likelihood of Layoffs...
New OnDemand Webinar: Taking Insider Risk Management to the Next Level – Source: www.databreachtoday.com
Source: www.databreachtoday.com – Author: 1 Fraud Management & Cybercrime , Next-Generation Technologies & Secure Development , Social Engineering June 12, 2023 Insider threats can...
Another Healthcare Vendor Reports Big Forta GoAnywhere Hack – Source: www.databreachtoday.com
Source: www.databreachtoday.com – Author: 1 3rd Party Risk Management , Governance & Risk Management , Healthcare Debt Collection Software Firm Intellihartx Says Nearly 490,000 Affected by...
Webinar – Mastering API Security: Understanding Your True Attack Surface – Source:thehackernews.com
Source: thehackernews.com – Author: . Jun 13, 2023The Hacker NewsAPI Security / Webinar Believe it or not, your attack surface is expanding faster than you realize....
Two Russian Nationals Charged for Masterminding Mt. Gox Crypto Exchange Hack – Source:thehackernews.com
Source: thehackernews.com – Author: . Jun 13, 2023Ravie LakshmananCyber Crime / Cryptocurrency The U.S. Department of Justice (DoJ) has charged two Russian nationals in connection with...
Critical FortiOS and FortiProxy Vulnerability Likely Exploited – Patch Now! – Source:thehackernews.com
Source: thehackernews.com – Author: . Jun 13, 2023Ravie LakshmananNetwork Security / Vulnerability Fortinet on Monday disclosed that a newly patched critical flaw impacting FortiOS and FortiProxy...
Expel Lays Off 10% of Workers 8 Months After Hauling in $31M – Source: www.govinfosecurity.com
Source: www.govinfosecurity.com – Author: 1 Managed Detection & Response (MDR) , Security Operations 60 Staffers Axed Months After Expel Slowed Hiring to Reduce Likelihood of Layoffs...
Another Healthcare Vendor Reports Big Forta GoAnywhere Hack – Source: www.govinfosecurity.com
Source: www.govinfosecurity.com – Author: 1 3rd Party Risk Management , Governance & Risk Management , Healthcare Debt Collection Software Firm Intellihartx Says Nearly 490,000 Affected by...
OnDemand Webinar: Start Gathering Your Own Threat Intelligence – Source: www.govinfosecurity.com
Source: www.govinfosecurity.com – Author: 1 Fraud Management & Cybercrime , Next-Generation Technologies & Secure Development , Ransomware See how deception technology offers clear signals in all...
New OnDemand Webinar: Taking Insider Risk Management to the Next Level – Source: www.govinfosecurity.com
Source: www.govinfosecurity.com – Author: 1 Fraud Management & Cybercrime , Next-Generation Technologies & Secure Development , Social Engineering June 12, 2023 Insider threats can...
Fortinet: New FortiOS RCE bug “may have been exploited” in attacks – Source: www.bleepingcomputer.com
Source: www.bleepingcomputer.com – Author: Sergiu Gatlan Fortinet says a critical FortiOS SSL VPN vulnerability that was patched last week “may have been exploited” in attacks impacting...
Have I Been Pwned warns of new Zacks data breach impacting 8 million – Source: www.bleepingcomputer.com
Source: www.bleepingcomputer.com – Author: Bill Toulas Zacks Investment Research (Zacks) has reportedly suffered an older, previously undisclosed data breach impacting 8.8 million customers, with the database...
Microsoft: Azure Portal outage was caused by traffic “spike” – Source: www.bleepingcomputer.com
Source: www.bleepingcomputer.com – Author: Sergiu Gatlan Microsoft revealed in an update to the Azure status page that the preliminary root cause behind an outage that impacted...
Exploit released for MOVEit RCE bug used in data theft attacks – Source: www.bleepingcomputer.com
Source: www.bleepingcomputer.com – Author: Sergiu Gatlan Horizon3 security researchers have released proof-of-concept (PoC) exploit code for a remote code execution (RCE) bug in the MOVEit Transfer...
Swiss government warns of ongoing DDoS attacks, data leak – Source: www.bleepingcomputer.com
Source: www.bleepingcomputer.com – Author: Bill Toulas The Swiss government has disclosed that a recent ransomware attack on an IT supplier might have impacted its data, while...
Business email compromise scams take new dimension with multi-stage attacks – Source: www.csoonline.com
Source: www.csoonline.com – Author: A new attack group leverages trusted relationships between partner organizations to bypass multifactor authentication. In a campaign that exploits the relationships between...
To solve the cybersecurity worker gap, forget the job title and search for the skills you need – Source: www.csoonline.com
Source: www.csoonline.com – Author: CISOs who focus on identifying job candidates with the skills they need are finding talent from other fields and functions to help...
Cycode’s free CI/CD monitoring tool offers new DevOps visibility – Source: www.csoonline.com
Source: www.csoonline.com – Author: An eBPF-based tool for code monitoring provides new visibility into the software pipeline, aiming to forestall further SolarWinds- or Codecov-style attacks. Anterovium...
Threat intelligence programs poised for growth – Source: www.csoonline.com
Source: www.csoonline.com – Author: Enterprise organizations will increase spending, investing in areas like threat intelligence distribution, digital risk management, and security technology integration. Flamingo Images /...
BrandPost: Closing coverage gaps: exploring three cloud-centric security approaches – Source: www.csoonline.com
Source: www.csoonline.com – Author: About | When you have comprehensive security, the future is yours to build. Learn about the strategies and solutions to secure your...