Source: www.govinfosecurity.com – Author: 1 Anders Norremo VP of Third Party Risk Products, BitSight Anders Norremo is an entrepreneur and company builder. He currently serves as...
Month: July 2023
Real Estate Firm Faces 3 Lawsuits in Addiction Center Breach – Source: www.govinfosecurity.com
Source: www.govinfosecurity.com – Author: 1 Fraud Management & Cybercrime , Governance & Risk Management , Privacy Proposed Class Actions Allege Negligence in Securing Addiction Treatment Data...
Apps with 1.5M installs on Google Play send your data to China – Source: www.bleepingcomputer.com
Source: www.bleepingcomputer.com – Author: Bill Toulas Security researchers discovered two malicious file management applications on Google Play with a collective installation count of over 1.5 million...
CISA: Netwrix Auditor RCE bug exploited in Truebot malware attacks – Source: www.bleepingcomputer.com
Source: www.bleepingcomputer.com – Author: Sergiu Gatlan CISA and the FBI warned today of new Truebot malware variants deployed on networks compromised using a critical remote code...
Nickelodeon investigates breach after leak of ‘decades old’ data – Source: www.bleepingcomputer.com
Source: www.bleepingcomputer.com – Author: Bill Toulas Nickelodeon has confirmed that the data leaked from an alleged breach of the company is legitimate but some of it...
Microsoft investigates Outlook.com bug breaking email search – Source: www.bleepingcomputer.com
Source: www.bleepingcomputer.com – Author: Sergiu Gatlan Microsoft is investigating an ongoing issue preventing Outlook.com users from searching their emails and triggering 401 exception errors. When searching,...
Cisco warns of bug that lets attackers break traffic encryption – Source: www.bleepingcomputer.com
Source: www.bleepingcomputer.com – Author: Sergiu Gatlan Cisco warned customers today of a high-severity vulnerability impacting some data center switch models and allowing attackers to tamper with...
JumpCloud resets admin API keys amid ‘ongoing incident’ – Source: www.bleepingcomputer.com
Source: www.bleepingcomputer.com – Author: Ax Sharma JumpCloud, a US-based enterprise software firm is notifying several customers of an “ongoing incident.” As a caution, the company has...
Android July security updates fix three actively exploited bugs – Source: www.bleepingcomputer.com
Source: www.bleepingcomputer.com – Author: Bill Toulas Google has released the monthly security updates for Android operating system, which comes with fixes for 46 vulnerabilities. Three of...
Over 130,000 solar energy monitoring systems exposed online – Source: www.bleepingcomputer.com
Source: www.bleepingcomputer.com – Author: Bill Toulas Security researchers are warning that tens of thousands of photovoltaic (PV) monitoring and diagnostic systems are reachable over the public...
Microsoft fixes bug behind Windows LSA protection warnings, again – Source: www.bleepingcomputer.com
Source: www.bleepingcomputer.com – Author: Sergiu Gatlan Microsoft is again pushing a Defender Antivirus update (first issued in April and pulled in May) that fixes a known...
RedEnergy Stealer Ransomware: A New Threat Targeting Critical Infrastructure – Source: heimdalsecurity.com
Source: heimdalsecurity.com – Author: Mihaela Marian A new strain of ransomware called RedEnergy Stealer has recently emerged, posing a significant threat to critical infrastructure systems worldwide....
SMUGX Campaign Targets European Entities – Source: heimdalsecurity.com
Source: heimdalsecurity.com – Author: Mihaela Marian In a recent cyberattack that has raised alarm bells across Europe, several entities in the region have become victims of...
Ransomware Attackers Dump Students’ Data Online After School Hacks – Source: heimdalsecurity.com
Source: heimdalsecurity.com – Author: Mihaela Marian In a disturbing trend, ransomware gangs have escalated their malicious activities by targeting schools and subsequently dumping students’ private files...
Linux Ransomware Exposed: Not Just a Windows Problem Anymore – Source: heimdalsecurity.com
Source: heimdalsecurity.com – Author: Gabriella Antal In the ever-evolving landscape of cyber threats, ransomware has emerged as a pervasive menace, causing widespread damage to individuals and...
Internal Threats: A Major Risk to Any Business – Source: heimdalsecurity.com
Source: heimdalsecurity.com – Author: Elena Georgescu As Daniel Wanderson wrote for Security Boulevard, a CEO must consider every aspect of his/her business – and cybersecurity is...
Cisco warns of a flaw in Nexus 9000 series switches that allows modifying encrypted traffic – Source: securityaffairs.com
Source: securityaffairs.com – Author: Pierluigi Paganini Cisco warns of a high-severity vulnerability in Nexus 9000 series switches that can allow attackers to read or modify encrypted...
StackRot, a new Linux Kernel privilege escalation vulnerability – Source: securityaffairs.com
Source: securityaffairs.com – Author: Pierluigi Paganini StackRot is s new security vulnerability in the Linux kernel that could be exploited to gain elevated privileges on a target...
Ransomware accounts for 54% of cyber threats in the health sector – Source: securityaffairs.com
Source: securityaffairs.com – Author: Pierluigi Paganini The European Union Agency for Cybersecurity (ENISA) releases its first cyber threat landscape report for the health sector. The European...
CVE-2022-29303 flaw in SolarView product can be exploited in attacks against the energy sector – Source: securityaffairs.com
Source: securityaffairs.com – Author: Pierluigi Paganini A vulnerability in SolarView product can be exploited in attacks targeting organizations in the energy sector. Researchers from the cybersecurity...
Iranian Hackers’ Sophisticated Malware Targets Windows and macOS Users – Source:thehackernews.com
Source: thehackernews.com – Author: . Jul 06, 2023Ravie LakshmananEndpoint Security / Malware The Iranian nation-state actor known as TA453 has been linked to a new set...
Truebot Hackers Exploiting Netwrix Auditor Flaw: CISA, FBI Alert – Source: www.securityweek.com
Source: www.securityweek.com – Author: Ryan Naraine The U.S. government’s cybersecurity agency CISA on Thursday warned hackers linked to the Truebot malware operation are exploiting a known...
Now’s the Time for a Pragmatic Approach to New Technology Adoption – Source: www.securityweek.com
Source: www.securityweek.com – Author: Marc Solomon To say there’s been a lot of hype around AI lately would be an understatement. We’ve all seen headlines touting...
JumpCloud Says All API Keys Invalidated to Protect Customers – Source: www.securityweek.com
Source: www.securityweek.com – Author: Eduard Kovacs Device, identity and access management solutions provider JumpCloud has reset customer API keys in response to an “ongoing incident”. JumpCloud...
Android Security Updates Patch 3 Exploited Vulnerabilities – Source: www.securityweek.com
Source: www.securityweek.com – Author: Ionut Arghire Security updates that Google released this week for Android resolve 43 vulnerabilities, including three that have been exploited in attacks....
28,000 Impacted by Data Breach at Pepsi Bottling Ventures – Source: www.securityweek.com
Source: www.securityweek.com – Author: Ionut Arghire More than 28,000 individuals were impacted by a data breach at independent bottling company Pepsi Bottling Ventures. Discovered on January...
Shell Confirms MOVEit-Related Breach After Ransomware Group Leaks Data – Source: www.securityweek.com
Source: www.securityweek.com – Author: Eduard Kovacs Energy giant Shell has confirmed that personal information belonging to employees has been compromised as a result of the recent...
StackRot Linux Kernel Vulnerability Shows Exploitability of UAFBR Bugs – Source: www.securityweek.com
Source: www.securityweek.com – Author: Eduard Kovacs A researcher has disclosed a Linux kernel vulnerability that he claims is the first to demonstrate that a type of...
Interpol: Key Member of Major Cybercrime Group Arrested in Africa – Source: www.securityweek.com
Source: www.securityweek.com – Author: Ionut Arghire Interpol on Wednesday announced the arrest of a suspected senior member of the French-speaking cybercrime group known as Opera1er. Also...
Vulnerability in Cisco Enterprise Switches Allows Attackers to Modify Encrypted Traffic – Source: www.securityweek.com
Source: www.securityweek.com – Author: Ionut Arghire Cisco this week informed customers about a high-severity vulnerability in its Nexus 9000 series switches that could allow unauthenticated attackers...





























