Source: grahamcluley.com – Author: Graham Cluley Leicester City Council suffers a crippling ransomware attack, and a massive data breach, but is it out of the dark...
Month: April 2024
City street lights “misbehave” after ransomware attack – Source: www.bitdefender.com
Source: www.bitdefender.com – Author: Graham Cluley The UK’s Leicester City Council was thrown into chaos last month when a crippling cyber attack forced it to shut...
Ransomware Rising Despite Takedowns, Says Corvus Report – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: 1 New ransomware gangs have already filled the void left by LockBit and ALPHV/BlackCat in the first quarter of 2024, according to...
YMCA Fined for Data Breach, ICO Raises Concerns About Privacy for People with HIV – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: 1 The Information Commissioner’s Office (ICO) has called for stronger protections for people living with HIV who are being denied “basic dignity...
Millions of Malicious Containers Found on Docker Hub – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: 1 Three large-scale malware campaigns have infiltrated Docker Hub, deploying millions of malicious “imageless” containers. The data comes from JFrog’s security research team,...
Disinformation: EU Opens Probe Against Facebook and Instagram Ahead of Election – Source: www.infosecurity-magazine.com
Source: www.infosecurity-magazine.com – Author: 1 Meta is under scrutiny for failing to tackle disinformation on its social media platforms. The EU Commission opened a probe on...
Man Who Mass-Extorted Psychotherapy Patients Gets Six Years – Source: krebsonsecurity.com
Source: krebsonsecurity.com – Author: BrianKrebs A 26-year-old Finnish man was sentenced to more than six years in prison today after being convicted of hacking into an...
Managed Detection and Response in 2023 – Source: securelist.com
Source: securelist.com – Author: Kaspersky Security Services Managed Detection and Response in 2023 (PDF) Alongside other security solutions, we provide Kaspersky Managed Detection and Response (MDR)...
3 Ways File Integrity Monitoring Identifies Zero-Day Attacks – Source: securityboulevard.com
Source: securityboulevard.com – Author: Lauren Yacono A zero-day attack leaves your software vulnerable to being exploited by hackers. It is a serious security risk. Cybercriminals are...
SSH vs. SSL/TLS: What’s The Difference? – Source: securityboulevard.com
Source: securityboulevard.com – Author: Krupa Patil SSH and SSL/TLS are two widely used cryptographic protocols for establishing secure connections and ensuring secure communication between two parties...
LockBit, RAGroup Drive Ransomware Attacks in March – Source: securityboulevard.com
Source: securityboulevard.com – Author: Nathan Eddy Global ransomware attacks rose slightly in March compared to the previous month, as ransomware cabal RAGroup ramped up activity by...
Multiple Apache HTTP Server Vulnerabilities Fixed in Ubuntu – Source: securityboulevard.com
Source: securityboulevard.com – Author: Rohan Timalsina The Ubuntu security team recently addressed several Apache HTTP Server vulnerabilities in Ubuntu 23.10, Ubuntu 23.04, Ubuntu 22.04 LTS, Ubuntu...
Preparing for Holiday Cyberattacks – Source: securityboulevard.com
Source: securityboulevard.com – Author: Nik Hewitt How can security teams be ready for holiday cyberattacks and a seasonal peak in cybercrime? Holiday cyberattacks are on the...
Debian 12: Redefining Stability and Innovation in Open-Source Operating Systems – Source: securityboulevard.com
Source: securityboulevard.com – Author: Anca Trusca Debian holds a distinguished position. Recognized as one of the oldest and most trusted distributions within the Linux ecosystem, Debian...
KapeKa Backdoor: Russian Threat Actor Group’s Recent Attacks – Source: securityboulevard.com
Source: securityboulevard.com – Author: Wajahat Raja In the realm of cybersecurity, vigilance is paramount. Recent discoveries have shed light on a previously undisclosed threat known as...
Ensuring RBI Compliance: Crucial Cybersecurity Measures to Protect Financial Standing – Source: securityboulevard.com
Source: securityboulevard.com – Author: Riddika Grover The rise of digital technology has provided great convenience to the banking sector, but it has also opened up the...
Symmetry Systems Announces World’s First Air-Gapped Deployment of a DSPM Solution – Source: securityboulevard.com
Source: securityboulevard.com – Author: Claude Mandy Pioneering DSPM deployment in high assurance environments sets new standard for comprehensive data protection Symmetry Systems,, the data+AI security company,...
MITRE ATT&CK v15: A Deeper Dive into SaaS Identity Compromise – Source: securityboulevard.com
Source: securityboulevard.com – Author: Farah Iyer The MITRE ATT&CK framework is a continually evolving resource, tracking the tactics, techniques, and procedures (TTPs) employed by adversaries across...
No more 12345: devices with weak passwords to be banned in UK – Source: www.theguardian.com
Source: www.theguardian.com – Author: Guardian staff and agency Tech that comes with weak passwords such as “admin” or “12345” will be banned in the UK under...
Change the law on computer evidence with an amendment to data protection bill | Letter – Source: www.theguardian.com
Source: www.theguardian.com – Author: Guardian Staff It is now clear that the Post Office was advised by its lawyers to delay disclosing some evidence that would...
Muddling Meerkat hackers manipulate DNS using China’s Great Firewall – Source: www.bleepingcomputer.com
Source: www.bleepingcomputer.com – Author: Bill Toulas A new cluster of activity tracked as “Muddling Meerkat” is believed to be linked to a Chinese state-sponsored threat actor’s manipulation...
FCC fines carriers $200 million for illegally sharing user location – Source: www.bleepingcomputer.com
Source: www.bleepingcomputer.com – Author: Sergiu Gatlan The Federal Communications Commission (FCC) has fined the largest U.S. wireless carriers almost $200 million for sharing their customers’ real-time location data without...
London Drugs pharmacy chain closes stores after cyberattack – Source: www.bleepingcomputer.com
Source: www.bleepingcomputer.com – Author: Sergiu Gatlan Canadian pharmacy chain London Drugs has closed all its retail stores to contain what it described as a “cybersecurity incident.”...
FBI warns of fake verification schemes targeting dating app users – Source: www.bleepingcomputer.com
Source: www.bleepingcomputer.com – Author: Bill Toulas Image: Midjourney The FBI is warning of fake verification schemes promoted by fraudsters on online dating platforms that lead to costly recurring subscription charges....
Google rejected 2.28 million risky Android apps from Play store in 2023 – Source: www.bleepingcomputer.com
Source: www.bleepingcomputer.com – Author: Bill Toulas Google blocked 2.28 million Android apps from being published on Google Play after finding various policy violations that could threaten user’s security....
Microsoft fixes bug behind incorrect BitLocker encryption errors – Source: www.bleepingcomputer.com
Source: www.bleepingcomputer.com – Author: Sergiu Gatlan Microsoft has fixed a known issue causing incorrect BitLocker drive encryption errors in some managed Windows environments. The company said...
Collection agency FBCS warns data breach impacts 1.9 million people – Source: www.bleepingcomputer.com
Source: www.bleepingcomputer.com – Author: Bill Toulas Financial Business and Consumer Solutions (FBCS) is warning 1,955,385 impacted individuals in the United States that the company suffered a...
US Post Office phishing sites get as much traffic as the real one – Source: www.bleepingcomputer.com
Source: www.bleepingcomputer.com – Author: Bill Toulas Security researchers analyzing phishing campaigns that target United States Postal Service (USPS) saw that the traffic to the fake domains...
Google Chrome’s new post-quantum cryptography may break TLS connections – Source: www.bleepingcomputer.com
Source: www.bleepingcomputer.com – Author: Sergiu Gatlan Some Google Chrome users report having issues connecting to websites, servers, and firewalls after Chrome 124 was released last week with...
Okta warns of “unprecedented” credential stuffing attacks on customers – Source: www.bleepingcomputer.com
Source: www.bleepingcomputer.com – Author: Bill Toulas Okta warns of an “unprecedented” spike in credential stuffing attacks targeting its identity and access management solutions, with some customer...