Source: www.securityweek.com – Author: Rik Ferguson While AI can significantly bolster defense mechanisms, it also equips adversaries with powerful tools to launch sophisticated cyberattacks. The post...
Year: 2023
LoanCare Notifying 1.3 Million of Data Breach Following Cyberattack on Parent Company – Source: www.securityweek.com
Source: www.securityweek.com – Author: Ionut Arghire LoanCare is informing 1.3 million individuals that their personal information was compromised in a data breach. The post LoanCare Notifying...
Kimsuky Hackers Deploying AppleSeed, Meterpreter, and TinyNuke in Latest Attacks – Source:thehackernews.com
Source: thehackernews.com – Author: . Dec 29, 2023NewsroomMalware / Cyber Threat Nation-state actors affiliated to North Korea have been observed using spear-phishing attacks to deliver an...
Microsoft Disables MSIX App Installer Protocol Widely Used in Malware Attacks – Source:thehackernews.com
Source: thehackernews.com – Author: . Dec 29, 2023NewsroomMalware / Endpoint Security Microsoft on Thursday said it’s once again disabling the ms-appinstaller protocol handler by default following...
Game mod on Steam breached to push password-stealing malware – Source: www.bleepingcomputer.com
Source: www.bleepingcomputer.com – Author: Sergiu Gatlan Downfall, a fan expansion for the popular Slay the Spire indie strategy game, was breached on Christmas Day to push...
Eagers Automotive halts trading in response to cyberattack – Source: www.bleepingcomputer.com
Source: www.bleepingcomputer.com – Author: Bill Toulas Eagers Automotive has announced it suffered a cyberattack and was forced to halt trading on the stock exchange as it...
EasyPark discloses data breach that may impact millions of users – Source: www.bleepingcomputer.com
Source: www.bleepingcomputer.com – Author: Bill Toulas Parking app developer EasyPark has published a notice on its website warning of a data breach it discovered on December...
Microsoft disables MSIX protocol handler abused in malware attacks – Source: www.bleepingcomputer.com
Source: www.bleepingcomputer.com – Author: Sergiu Gatlan Microsoft has again disabled the MSIX ms-appinstaller protocol handler after multiple financially motivated threat groups abused it to infect Windows...
Kroll reveals FTX customer info exposed in August data breach – Source: www.bleepingcomputer.com
Source: www.bleepingcomputer.com – Author: Sergiu Gatlan Risk and financial advisory company Kroll has released additional details regarding the August data breach, which exposed the personal information...
Russian military hackers target Ukraine with new MASEPIE malware – Source: www.bleepingcomputer.com
Source: www.bleepingcomputer.com – Author: Bill Toulas Ukraine’s Computer Emergency Response Team (CERT) is warning of a new phishing campaign that allowed Russia-linked hackers to deploy previously...
Apache OFBiz RCE flaw exploited to find vulnerable Confluence servers – Source: www.bleepingcomputer.com
Source: www.bleepingcomputer.com – Author: Bill Toulas A critical Apache OFBiz pre-authentication remote code execution vulnerability is being actively exploited using public proof of concept (PoC) exploits. Apache...
USENIX Security ’23 – Xiaojun Xu, Qingying Hao, Zhuolin Yang, Bo Li, David Liebovitz, Gang Wang, Carl A. Gunter ‘How to Cover up Anomalous Accesses to Electronic Health Records’ – Source: securityboulevard.com
Source: securityboulevard.com – Author: Marc Handelman Cloud Security, Governance and Skills in 2024 Step 1 of 6 16% Who in your organization is responsible for cloud...
What Is Friendly Fraud (and How Can You Combat It)? – Source: securityboulevard.com
Source: securityboulevard.com – Author: Sarah Hunter-Lascoskie While businesses must prevent a variety of fraud types, the most dangerous fraud is often the one that goes unnoticed...
Daniel Stori’s ‘Distributed Architecture Drama’ – Source: securityboulevard.com
Source: securityboulevard.com – Author: Marc Handelman No one specifically Someone on our general security team A dedicated person/team that handles cloud security Cloud architects and developers...
Navigating the MSP Ecosystem in 2024: The Trifecta of Success – Leadership, Empathy, and Execution – Source: securityboulevard.com
Source: securityboulevard.com – Author: Amy Luby, VP Ecosystems at Seceon As the curtains draw close on another tech-filled year, let’s take a delightful detour into the...
Kaseya’s 2023 Highlights and the Road Ahead – Source: securityboulevard.com
Source: securityboulevard.com – Author: Kaseya Woohoo! What an exciting year 2023 turned out to be. Right from upgrading to VSA 10 to unlocking the efficiencies between...
Guardians of Tomorrow: Arkose Labs Shares the Top 3 Cyber Threats for 2024 – Source: securityboulevard.com
Source: securityboulevard.com – Author: Jenn Jeffers If you missed our recent webinar, “Foreseeing the Future Threatscape: 2024’s Bad Actor Forecast,” there’s still time to catch up...
USENIX Security ’23 – ‘Squint Hard Enough: Attacking Perceptual Hashing With Adversarial Machine Learning’ – Source: securityboulevard.com
Source: securityboulevard.com – Author: Marc Handelman Jonathan Prokos, Neil Fendley, Matthew Green, Roei Schuster, Eran Tromer, Tushar Jois, Yinzhi Cao Many thanks to USENIX for publishing...
2023: Top 10 Cybersecurity Stats That Make You Go Hmmmmm – Source: securityboulevard.com
Source: securityboulevard.com – Author: Rob Burgundy Rob Burgundy Lead Anchor, WMMX Rob Burgundy, the much better-looking younger brother of Ron Burgundy, is the charismatic lead anchor...
USENIX Security ’23 – Rethinking System Audit Architectures for High Event Coverage and Synchronous Log Availability – Source: securityboulevard.com
Source: securityboulevard.com – Author: Marc Handelman Authors/Presenters: Varun Gandhi, Sarbartha Banerjee, Aniket Agrawal, Adil Ahmad, Sangho Lee, Marcus Peinado Many thanks to USENIX for publishing their...
Google to Settle $5B ‘Incognito Mode’ Privacy Issue Lawsuit – Source: www.databreachtoday.com
Source: www.databreachtoday.com – Author: 1 Governance & Risk Management , Legislation & Litigation , Privacy Deal Follows Court Ruling That Cleared the 4-Year-Old Class Action Claim...
New Cyberattack Wave Targets Albanian Parliament, Telecom – Source: www.databreachtoday.com
Source: www.databreachtoday.com – Author: 1 Cyberwarfare / Nation-State Attacks , Fraud Management & Cybercrime , Government Mobile Network Provider and National Flag Carrier Also Targeted Mihir...
Webinar | From Zero to Hero: Mastering the Multi-Cloud Landscape with Network Security Intelligence – Source: www.databreachtoday.com
Source: www.databreachtoday.com – Author: 1 Thank you for registering with ISMG Complete your profile and stay up to date Need help registering? Contact Support Original Post...
Cryptohack Roundup: Thunder Terminal Repels Attack – Source: www.databreachtoday.com
Source: www.databreachtoday.com – Author: 1 Cryptocurrency Fraud , Fraud Management & Cybercrime Also: Binance Ex-CEO’s Wealth Up $25B; Coinbase Refutes Senate Claims; $3M Scam Rashmi Ramesh...
Breach Roundup: Real Estate Firm Exposes Celebrity Data – Source: www.databreachtoday.com
Source: www.databreachtoday.com – Author: 1 Breach Notification , Cybercrime , Fraud Management & Cybercrime Also: Yakult Australia Admits to Experiencing ‘Cybersecurity Incident’ Prajeet Nair (@prajeetspeaks) •...
Google Cloud Resolves Privilege Escalation Flaw Impacting Kubernetes Service – Source:thehackernews.com
Source: thehackernews.com – Author: . Dec 28, 2023NewsroomCloud Security / Data Protection Google Cloud has addressed a medium-severity security flaw in its platform that could be...
A tale of 2 casino ransomware attacks: One paid out, one did not – Source: go.theregister.com
Source: go.theregister.com – Author: Team Register Feature The same cybercrime crew broke into two high-profile Las Vegas casino networks over the summer, infected both with ransomware,...
Kaspersky reveals previously unknown hardware ‘feature’ used in iPhone attacks – Source: go.theregister.com
Source: go.theregister.com – Author: Team Register Kaspersky’s Global Research and Analysis Team (GReAT) has exposed a previously unknown ‘feature’ in Apple iPhones that allows attackers to...
In Cybersecurity and Fashion, What’s Old Is New Again – Source: www.darkreading.com
Source: www.darkreading.com – Author: Chaz Lever Source: NicoElNino via Alamy Stock Photo COMMENTARY While distributed denial-of-service (DDoS) attacks and zero-day threats are nothing new in cybersecurity,...