Source: www.infosecurity-magazine.com – Author: 1 CardioComm Solutions, a Canadian medical provider of consumer heart monitoring and medical ECG software solutions, has disclosed a cybersecurity incident on...
Month: July 2023
High Severity Vulnerabilities Discovered in Ninja Forms Plugin – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: 1 Multiple high-severity vulnerabilities have been discovered in Ninja Forms, a popular forms builder plugin for WordPress with over 900,000 active installations....
China’s Wuhan Earthquake Center Suffers Cyber-Attack – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: 1 The Wuhan Earthquake Monitoring Center in China has been hit by a cyber-incident perpetuated by a hacker group with an “overseas...
“Mysterious Elephant” Emerges, Kaspersky Reports – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: 1 A new malicious actor known as “Mysterious Elephant” operating in the Asia-Pacific region has emerged in the threat landscape in the second...
OpenAI, Microsoft, Google and Anthropic Form Body to Regulate AI – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: 1 You may have heard Sam Altman, the man behind ChatGPT, call for the regulation of future AI models while at the...
NCSC Publishes New Guidance on Shadow IT – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: 1 The UK’s leading cybersecurity agency has released new guidance for system owners and technical staff on how to manage shadow IT...
Supply Chain Attack Hits NHS Ambulance Trusts – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: 1 A cyber-attack on an NHS supplier has left two ambulance trusts serving millions of people without access to electronic patient records,...
SEC Wants Cyber-Incident Disclosure Within Four Days – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: 1 The US Securities and Exchange Commission (SEC) has adopted new rules requiring publicly listed firms to disclose serious incidents within four...
GameOver(lay): Two Severe Linux Vulnerabilities Impact 40% of Ubuntu Users – Source:thehackernews.com
Source: thehackernews.com – Author: . Jul 27, 2023THNLinux / Endpoint Security Cybersecurity researchers have disclosed two high-severity security flaws in the Ubuntu kernel that could pave...
New Malvertising Campaign Distributing Trojanized IT Tools via Google and Bing Search Ads – Source:thehackernews.com
Source: thehackernews.com – Author: . Jul 27, 2023THNMalvertising / Software Security A new malvertising campaign has been observed leveraging ads on Google Search and Bing to...
7 Best Cloud Security Posture Management (CSPM) Software for 2023 – Source: www.techrepublic.com
Source: www.techrepublic.com – Author: Franklin Okeke Orca Security: Best for cloud workloads Prisma Cloud: Best for multicloud environments Wiz: Best for managing identity-based exposure PingSafe: Best...
4 Most Dangerous and Destructive Ransomware Groups of 2022 – Source: www.techrepublic.com
Source: www.techrepublic.com – Author: Lance Whitney Image: nicescene/Adobe Stock 2022 marked another year in which ransomware proved to be one of the most pernicious cyberthreats around...
Get 8 Months of Live Cyber Security Training for Under $500 – Source: www.techrepublic.com
Source: www.techrepublic.com – Author: TechRepublic Academy on July 25, 2023, 1:33 PM EDT Get 8 Months of Live Cyber Security Training for Under $500 If you’re...
Checklist: Securing Digital Information – Source: www.techrepublic.com
Source: www.techrepublic.com – Author: Digital information is generally the lifeblood of any given organization, containing essential company data needed to run the business. Paperless offices have...
NATO probes hacktivist crew’s boasts of stolen portal data – Source: go.theregister.com
Source: go.theregister.com – Author: Team Register NATO is investigating claims by miscreants that they broke into the military alliance’s unclassified information-sharing and collaboration IT environment, stole...
Healthcare files of 8M-plus people fall into hands of Clop via MOVEit mega-bug – Source: go.theregister.com
Source: go.theregister.com – Author: Team Register Accounting giant Deloitte, pizza and birthday party chain Chuck E. Cheese, government contractor Maximus, and the Hallmark Channel are among...
Think tank calls for monitoring of Chinese AI-enabled products – Source: go.theregister.com
Source: go.theregister.com – Author: Team Register Chinese made AI-enabled products should spark similar concerns to Middle Kingdom sourced 5G equipment and therefore be regulated, said think...
BreachForums database and private chats for sale in hacker data breach – Source: www.bleepingcomputer.com
Source: www.bleepingcomputer.com – Author: Lawrence Abrams While consumers are usually the ones worried about their information being exposed in data breaches, it’s now the hacker’s turn,...
Zimbra patches zero-day vulnerability exploited in XSS attacks – Source: www.bleepingcomputer.com
Source: www.bleepingcomputer.com – Author: Sergiu Gatlan Two weeks after the initial disclosure, Zimbra has released security updates that patch a zero-day vulnerability exploited in attacks targeting...
SSNDOB cybercrime market admin faces 15 years after pleading guilty – Source: www.bleepingcomputer.com
Source: www.bleepingcomputer.com – Author: Bill Toulas A Ukrainian man, Vitalii Chychasov, has pleaded guilty in the United States to conspiracy to commit access device fraud and...
WordPress Ninja Forms plugin flaw lets hackers steal submitted data – Source: www.bleepingcomputer.com
Source: www.bleepingcomputer.com – Author: Bill Toulas Popular WordPress form-building plugin Ninja Forms contains three vulnerabilities that could allow attackers to achieve privilege escalation and steal user...
8 million people hit by data breach at US govt contractor Maximus – Source: www.bleepingcomputer.com
Source: www.bleepingcomputer.com – Author: Bill Toulas U.S. government services contractor Maximus has disclosed a data breach warning that hackers stole the personal data of 8 to...
Swiss visa appointments cancelled in UK due to ‘IT incident’ – Source: www.bleepingcomputer.com
Source: www.bleepingcomputer.com – Author: Ax Sharma All appointments for Swiss (Schengen) tourist and transit visas have been cancelled across the UK. TLScontact, the Swiss government’s chosen IT...
Cyberattack Investigation Shuts Down Ambulance Patient Records System – Source: heimdalsecurity.com
Source: heimdalsecurity.com – Author: Madalina Popovici A cyber attack on health software company Ortivus has led to the shutdown of the ambulance patient records system, affecting...
TSA Updates Pipeline Cybersecurity Requirements – Source: www.darkreading.com
Source: www.darkreading.com – Author: Dark Reading Staff, Dark Reading A year after the Transportation Security Administration (TSA) updated requirements for pipeline owners and operators to improve their defenses...
Group-IB Co-Founder Sentenced to 14 Years in Russian Penal Colony – Source: www.darkreading.com
Source: www.darkreading.com – Author: Dark Reading Staff, Dark Reading Ilya Sachkov, co-founder and former CEO of Group-IB, a computer software company and cybersecurity firm that specializes...
Israeli-Trained Azerbaijan Cyber Students Mark Inaugural Graduation – Source: www.darkreading.com
Source: www.darkreading.com – Author: Dark Reading Staff, Dark Reading The first class from the Azerbaijan Cyber Security Center has graduated. Trained by Israeli staff from the...
What Will CISA’s Secure Software Development Attestation Form Mean? – Source: www.darkreading.com
Source: www.darkreading.com – Author: Curtis Yanko, Principal Solutions Architect, GrammaTech When the White House issued the Cybersecurity Executive Order for National Cybersecurity in May 2021, observers...
Ubuntu Linux Cloud Workloads Face Rampant Root Take Takeovers – Source: www.darkreading.com
Source: www.darkreading.com – Author: Elizabeth Montalbano, Contributor, Dark Reading Two vulnerabilities in the Ubuntu implementation of a popular container-based file system allow attackers to execute code...
Why Today’s CISOs Must Embrace Change – Source: www.darkreading.com
Source: www.darkreading.com – Author: Chip Stewart, Former CISO for the State of Maryland After recently serving as the chief information security officer (CISO) for the state...