Source: www.infosecurity-magazine.com – Author: 1 UK communications regulator Ofcom has become the latest organization to be impacted by the Clop extortion campaign targeting a zero-day bug...
Day: June 13, 2023
Historic Zacks Breach Impacts Nearly Nine Million – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: 1 Security researchers have discovered a breach at Zacks Investment Research dating all the way back to 2020, which appears to have...
Why Critical Infrastructure Remains a Ransomware Target – Source: www.darkreading.com
Source: www.darkreading.com – Author: Joe Stewart, Principal Security Researcher, eSentire There continues to be a lot of pressure on security leaders to do more with less,...
Researchers Report First Instance of Automated SaaS Ransomware Extortion – Source: www.darkreading.com
Source: www.darkreading.com – Author: Jai Vijayan, Contributing Writer, Dark Reading The 0mega ransomware group has successfully pulled off an extortion attack against a company’s SharePoint Online...
New Loader Delivering Spyware via Image Steals Cryptocurrency Info – Source: www.darkreading.com
Source: www.darkreading.com – Author: Nate Nelson, Contributing Writer, Dark Reading A sophisticated attack by Russian-language actors is using a novel loader and malware-laced PNG image file...
The commonality of criminal intrusion – Source: go.theregister.com
Source: go.theregister.com – Author: Team Register Webinar It seems no longer possible to imagine whether it’s just a case of if a security breach will occur...
These Microsoft Office security signatures are ‘practically worthless’ – Source: go.theregister.com
Source: go.theregister.com – Author: Team Register Office Open XML (OOXML) Signatures, an Ecma/ISO standard used in Microsoft Office applications and open source OnlyOffice, have several security...
Russia-Ukraine war sending shockwaves into cyber-ecosystem – Source: go.theregister.com
Source: go.theregister.com – Author: Team Register Sponsored Feature When military historians come to chronicle the first 15 months of the Russian invasion of Ukraine, they won’t...
UK telco watchdog Ofcom, Minnesota Dept of Ed named as latest MOVEit victims – Source: go.theregister.com
Source: go.theregister.com – Author: Team Register Two more organizations hit in the mass exploitation of the MOVEit file-transfer tool have been named – the Minnesota Department...
China’s cyber now aimed at infrastructure, warns CISA boss – Source: go.theregister.com
Source: go.theregister.com – Author: Team Register China’s cyber-ops against the US have shifted from espionage activities to targeting infrastructure and societal disruption, the director of the...
India probes medical info ‘leak’ to Telegram – Source: go.theregister.com
Source: go.theregister.com – Author: Team Register Asia In Brief India’s government has denied its Co-WIN COVID-19 vaccination management platform has leaked data, but ordered an investigation...
Unsealed: Charges against Russians blamed for Mt Gox crypto-exchange collapse – Source: go.theregister.com
Source: go.theregister.com – Author: Team Register American prosecutors have unsealed an indictment against two Russians who allegedly had a hand in the ransacking and collapse of...
Fortinet squashes hijack-my-VPN bug in FortiOS gear – Source: go.theregister.com
Source: go.theregister.com – Author: Team Register Fortinet has patched a critical bug in its FortiOS and FortiProxy SSL-VPN that can be exploited to hijack the equipment....
Posing as journalists, Pink Drainer pilfers $3.3M in crypto – Source: go.theregister.com
Source: go.theregister.com – Author: Team Register Miscreants targeting Discord and Twitter accounts have stolen more than $3.3 million in cryptocurrency from 2,300 victims so far in...
Microsoft stole our stolen dark web data, says security outfit – Source: go.theregister.com
Source: go.theregister.com – Author: Team Register Microsoft stands accused by cyber intelligence firm Hold Security of violating an agreement between the pair by misusing Hold’s database...
DDoS threats and defense: How certain assumptions can lead to an attack – Source: www.techrepublic.com
Source: www.techrepublic.com – Author: Jag Bains Image: iStockphoto/stevanovicigor Jump to: Why ‘blackholing’ is no longer sufficient as a strategy Outsourcing DDoS protection poses dangerous risks Cybersecurity...
Google’s ChromeOS aims for enterprise with security and compatibility – Source: www.techrepublic.com
Source: www.techrepublic.com – Author: Karl Greenberg Adobe Stock by: Monticellllo During the Google I/O event last month, the global tech giant showed off new elements of...
Equipment reassignment checklist – Source: www.techrepublic.com
Source: www.techrepublic.com – Author: © 2023 TechnologyAdvice. All Rights Reserved. Payment Information Address Line 1 Address Line 2 (Optional) Country Enter Promo Code (Optional) Your total...
DDoS attacks launched against Swiss websites ahead of Zelensky address
Swiss government websites were taken offline through the use of targeted distributed-denial-of-service (DDoS) attacks ahead of a video address by Ukranian President, Volodymyr Zelensky. DDoS attacks...
E-Commerce Firms Are Top Targets for API, Web Apps Attacks – Source: www.databreachtoday.com
Source: www.databreachtoday.com – Author: 1 API Security , Application Security , Next-Generation Technologies & Secure Development Akamai: Rapid Digitalization, Flawed Code Led to 14 Billion Attacks...
Expel Lays Off 10% of Workers 8 Months After Hauling in $31M – Source: www.databreachtoday.com
Source: www.databreachtoday.com – Author: 1 Managed Detection & Response (MDR) , Security Operations 60 Staffers Axed Months After Expel Slowed Hiring to Reduce Likelihood of Layoffs...
New OnDemand Webinar: Taking Insider Risk Management to the Next Level – Source: www.databreachtoday.com
Source: www.databreachtoday.com – Author: 1 Fraud Management & Cybercrime , Next-Generation Technologies & Secure Development , Social Engineering June 12, 2023 Insider threats can...
Another Healthcare Vendor Reports Big Forta GoAnywhere Hack – Source: www.databreachtoday.com
Source: www.databreachtoday.com – Author: 1 3rd Party Risk Management , Governance & Risk Management , Healthcare Debt Collection Software Firm Intellihartx Says Nearly 490,000 Affected by...
Webinar – Mastering API Security: Understanding Your True Attack Surface – Source:thehackernews.com
Source: thehackernews.com – Author: . Jun 13, 2023The Hacker NewsAPI Security / Webinar Believe it or not, your attack surface is expanding faster than you realize....
Two Russian Nationals Charged for Masterminding Mt. Gox Crypto Exchange Hack – Source:thehackernews.com
Source: thehackernews.com – Author: . Jun 13, 2023Ravie LakshmananCyber Crime / Cryptocurrency The U.S. Department of Justice (DoJ) has charged two Russian nationals in connection with...
Critical FortiOS and FortiProxy Vulnerability Likely Exploited – Patch Now! – Source:thehackernews.com
Source: thehackernews.com – Author: . Jun 13, 2023Ravie LakshmananNetwork Security / Vulnerability Fortinet on Monday disclosed that a newly patched critical flaw impacting FortiOS and FortiProxy...
Expel Lays Off 10% of Workers 8 Months After Hauling in $31M – Source: www.govinfosecurity.com
Source: www.govinfosecurity.com – Author: 1 Managed Detection & Response (MDR) , Security Operations 60 Staffers Axed Months After Expel Slowed Hiring to Reduce Likelihood of Layoffs...
Another Healthcare Vendor Reports Big Forta GoAnywhere Hack – Source: www.govinfosecurity.com
Source: www.govinfosecurity.com – Author: 1 3rd Party Risk Management , Governance & Risk Management , Healthcare Debt Collection Software Firm Intellihartx Says Nearly 490,000 Affected by...
OnDemand Webinar: Start Gathering Your Own Threat Intelligence – Source: www.govinfosecurity.com
Source: www.govinfosecurity.com – Author: 1 Fraud Management & Cybercrime , Next-Generation Technologies & Secure Development , Ransomware See how deception technology offers clear signals in all...
New OnDemand Webinar: Taking Insider Risk Management to the Next Level – Source: www.govinfosecurity.com
Source: www.govinfosecurity.com – Author: 1 Fraud Management & Cybercrime , Next-Generation Technologies & Secure Development , Social Engineering June 12, 2023 Insider threats can...