Source: www.securityweek.com – Author: Kevin Townsend Cloud security specialist Qualys has provided its view of the top five cloud security risks, drawing insights and data from...
Day: August 3, 2023
Decommissioned Medical Infusion Pumps Expose Wi-Fi Configuration Data – Source: www.securityweek.com
Source: www.securityweek.com – Author: Ionut Arghire Most medical infusion pumps sold via secondary market sources still contain Wi-Fi configuration settings from the original organization that deployed...
Cybersecurity M&A Roundup: 42 Deals Announced in July 2023 – Source: www.securityweek.com
Source: www.securityweek.com – Author: Eduard Kovacs Forty-two cybersecurity-related merger and acquisition (M&A) deals were announced in July 2023. The number of transactions has bounced back following...
Google Awards Over $60,000 for V8 Vulnerabilities Patched With Chrome 115 Update – Source: www.securityweek.com
Source: www.securityweek.com – Author: Ionut Arghire Google on Wednesday announced a Chrome 115 update that patches 17 vulnerabilities, including 11 flaws reported by external researchers. The...
Salesforce Email Service Zero-Day Exploited in Phishing Campaign – Source: www.securityweek.com
Source: www.securityweek.com – Author: Eduard Kovacs Threat actors have exploited a Salesforce zero-day vulnerability and abused Meta features in a sophisticated phishing campaign, according to web...
Software Supply Chain Startup Endor Labs Scores Massive $70M Series A Round – Source: www.securityweek.com
Source: www.securityweek.com – Author: Ryan Naraine Just ten months after securing an abnormally large seed-stage funding round, software supply chain startup Endor Labs has attracted renewed...
Microsoft Catches Russian Government Hackers Phishing with Teams Chat App – Source: www.securityweek.com
Source: www.securityweek.com – Author: Ryan Naraine Software giant Microsoft on Wednesday sounded an alarm after catching a known Russian government-linked hacking group using its Microsoft Teams...
Hacktivist Collective “Mysterious Team Bangladesh” Revealed – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: 1 Threat intelligence experts from Group-IB have shed light on the hacktivist collective known as Mysterious Team Bangladesh. In a report published...
Cisco Talos Discusses Flaws in SOHO Routers Post-VPNFilter – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: 1 Cisco Talos has published a list of numerous vulnerabilities in small and home office (SOHO) and industrial wireless routers. In their...
Microsoft Teams Targeted in Midnight Blizzard Phishing Attacks – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: 1 Microsoft Threat Intelligence has recently detected a series of highly targeted social engineering attacks employing credential theft phishing lures delivered as...
Cyber-Attacks Targeting Government Agencies Increase 40% – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: 1 Cyber-attacks against government agencies and public sector services are up 40% in the second quarter of 2023 compared to the first....
Menlo Leverages Advanced Technology to Combat Surging Browser Threats – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: 1 With the deployment of software-as-a-service tools, like Workday and Salesforce to name a few, workers are now spending more time than...
Humans Unable to Reliably Detect Deepfake Speech – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: 1 Humans cannot detect deepfake speech 27% the time, researchers from University College London (UCL) have found during a recent study. The...
What’s happening in the world of crimeware: Emotet, DarkGate and LokiBot – Source: securelist.com
Source: securelist.com – Author: GReAT Introduction The malware landscape keeps evolving. New families are born, while others disappear. Some families are short-lived, while others remain active...
What Is Endpoint Security? – Source: heimdalsecurity.com
Source: heimdalsecurity.com – Author: Andreea Chebac A significant portion of cyberattacks target endpoints, either individually or as gateways to the larger company network. Experts Insights mention that...
Piles of Unpatched IoT, OT Devices Attract ICS Cyberattacks – Source: www.darkreading.com
Source: www.darkreading.com – Author: Becky Bracken, Editor, Dark Reading Despite efforts across both the public and private sectors to shore up industrial control system (ICS) cybersecurity,...
How to Create an Effective GRC Program: 3 Phases – Source: www.darkreading.com
Source: www.darkreading.com – Author: Jon Siegler, Chief Product Officer, LogicGate The world of risk management and compliance is evolving as risks become more complex and challenging...
CISOs Need Backing to Take Charge of Security – Source: www.darkreading.com
Source: www.darkreading.com – Author: Evan Schuman, Contributing Writer, Dark Reading According to a recent report, only five of the Fortune 100 companies count their heads of...
Russian APT ‘BlueCharlie’ Swaps Infrastructure to Evade Detection – Source: www.darkreading.com
Source: www.darkreading.com – Author: Nate Nelson, Contributing Writer, Dark Reading In a futile attempt to evade detection, the Russian espionage group “BlueCharlie” has swapped out all...
Menlo Security Establishes Browser Security With AI-Powered Phishing and Ransomware Protection – Source: www.darkreading.com
Source: www.darkreading.com – Author: 1 MOUNTAIN VIEW, Calif., August 1, 2023 – Menlo Security, Inc. (“Menlo Security”), a leader in browser security, today announced HEAT Shield™ and...
Hot Topic Apparel Brand Faces Credential-Stuffing Attack – Source: www.darkreading.com
Source: www.darkreading.com – Author: Dark Reading Staff, Dark Reading Customers of American retailer Hot Topic are being notified about multiple “credential-stuffing” cyberattacks that resulted in cracked...
Cyber-Insurance Underwriting Is Still Stuck in the Dark Ages – Source: www.darkreading.com
Source: www.darkreading.com – Author: Robert R. Ackerman Jr., Founder & Managing Director, AllegisCyber Capital Insurance underwriters are storied for their analytical and extremely methodical use of...
Tesla Jailbreak Unlocks Theft of In-Car Paid Features – Source: www.darkreading.com
Source: www.darkreading.com – Author: Tara Seals, Managing Editor, News, Dark Reading Tesla cars are susceptible to a nearly irreversible jailbreak of their onboard infotainment systems that...
Utilities Face Security Challenges as They Embrace Data in New Ways – Source: www.darkreading.com
Source: www.darkreading.com – Author: Don Reeves, Senior Vice President, Outcomes, Itron The world is facing a perfect storm of market pressures — from geopolitical to economic...
Essential elements for a comprehensive cloud security stack – Source: www.cybertalk.org
Source: www.cybertalk.org – Author: slandau By Dotan Nahum CEO and Founder at Spectral. Digital transformation is pushing business entities to deploy products faster than ever, but...
News Alert: Normalyze extends its DSPM platform to hybrid cloud and on-prem environments – Source: www.lastwatchdog.com
Source: www.lastwatchdog.com – Author: bacohido San Francisco, Calif., Aug. 2, 2023 – Normalyze, a pioneer in cloud data security, today introduced new capabilities to protect data...
Cocaine Smugglers that Posed as PC Sellers Jailed – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: 1 Several members of an organized crime group (OGC) have been sentenced after police secretly monitored tens of thousands of messages they...
Hundreds of Citrix Endpoints Compromised With Webshells – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: 1 Around 600 global Citrix servers have been compromised by a zero-day exploit enabling webshells to be installed, according to a non-profit tracking...
Ivanti Patches Yet Another Critical Flaw – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: 1 Security vendor Ivanti has disclosed yet another critical vulnerability in its products, linked to a previous zero-day that was exploited by...
Manufacturing Sector Reeling From Financial Costs of Ransomware – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: 1 The enormous global costs of ransomware attacks on the manufacturing sector have been laid bare in a new analysis by Comparitech....