Source: www.databreachtoday.com – Author: 1. 3rd Party Risk Management , Fraud Management & Cybercrime , Governance & Risk Management Fortra Reveals Findings From GoAnywhere MFT Attack...
Author:
Infoblox Uncovers DNS Malware Toolkit & Urges Companies to Block Malicious Domains
SANTA CLARA, Calif., April 20, 2023 /PRNewswire/ — Infoblox Inc. the company that delivers a simplified, cloud- enabled networking and security platform for improved performance and protection, today published...
Bitsight Expands into Integrated Cyber-Risk Management
BOSTON – April 20, 2023 – Bitsight, a leader in managing and monitoring cyber risk, today unveiled its expansion into a broader category of integrated cyber risk...
Red Canary Announces Readiness
DENVER, April 20, 2023 /PRNewswire/ — Red Canary, a leader in managed detection and response, launched Red Canary Readiness, a new portfolio of offerings that gives teams a...
North Korean Hacker Suspected in 3CX Software Supply Chain Attack
The 3CX Desktop App software has been reportedly compromised via a prior software supply chain breach, with a North Korean actor suspected to be responsible. According...
Daggerfly APT Targets African Telecoms Firm With New MgBot Malware
The APT group known as Daggerfly (as well as Evasive Panda and Bronze Highland) has been observed targeting a telecommunications organization in Africa with new plugins...
ChatGPT-Related Malicious URLs on the Rise
The number of newly registered and squatting domains related to ChatGPT grew by 910% monthly between November 2022 and early April 2023. The findings, shared by...
#CYBERUK23: UK Strengthens Cybersecurity Audits for Government Agencies
The UK Government has officially launched GovAssure, a new regime of independent audits of government agencies’ cyber resilience, the Chancellor of the Duchy of Lancaster Oliver...
Cryptohack Roundup: Bitrue, Hundred Finance, SafeMoon – Source: www.databreachtoday.com
Source: www.databreachtoday.com – Author: 1. Blockchain & Cryptocurrency , Cryptocurrency Fraud , Fraud Management & Cybercrime Also: $10.5M Exploit on 11 Blockchains, MetaMask Third-Party Breach Rashmi...
Emerging Security Concerns About Generative AI in Healthcare – Source: www.databreachtoday.com
Source: www.databreachtoday.com – Author: 1. Generative AI tools such as ChatGPT will undoubtedly change the way clinicians and healthcare cybersecurity professionals work, but the use of...
Why Aren’t 3rd Parties More Transparent About Breaches? – Source: www.databreachtoday.com
Source: www.databreachtoday.com – Author: 1. Third-party vendors should be more transparent and faster in communicating when they experience a breach or other security incident that affect...
North Korean Hackers Chained Supply Chain Hacks to Reach 3CX – Source: www.databreachtoday.com
Source: www.databreachtoday.com – Author: 1. Cyberwarfare / Nation-State Attacks , Fraud Management & Cybercrime Mandiant Concludes 3CX Hack Was Result of Earlier Hack on Trading Software...
Refurbished Routers Contain Sensitive Corporate Data – Source: www.databreachtoday.com
Source: www.databreachtoday.com – Author: 1. Endpoint Security , Hardware / Chip-level Security Eset Finds Customer Info, VPN Credentials & Authentication Keys on Used Routers Prajeet Nair...
Commercial Surveillance Industry Set for Growth, Says NCSC – Source: www.databreachtoday.com
Source: www.databreachtoday.com – Author: 1. Cyberwarfare / Nation-State Attacks , Fraud Management & Cybercrime , Geo Focus: The United Kingdom At Least 80 Countries Have Purchased...
5 Cybersecurity Pillars Where 85% of Companies Are Lagging – Source: www.databreachtoday.com
Source: www.databreachtoday.com – Author: 1. Only 15% of Global Orgs Rank as ‘Mature’ on Cisco’s Cybersecurity Readiness Index Tom Gillis • April 12, 2023 ...
Coro Raises an Additional $75M Bringing the Total Raised to $155M in 12 Months
NEW YORK–(BUSINESS WIRE) — Coro, the modern cybersecurity platform for mid-market organizations, today announced a $75M funding round, bringing the total funding raised in the last...
Akamai Technologies to Acquire API Security Company Neosec
CAMBRIDGE, Mass., April 19, 2023 /PRNewswire/ — Akamai Technologies, Inc. (NASDAQ: AKAM), the cloud company that powers and protects life online, today announces that it has entered into a...
Iranian Nation-State Actor “Mint Sandstorm” Weaponizes N-day Flaws
A threat actor associated with Iranian nation-state hackers has been weaponizing N-day vulnerabilities, as well as deploying new techniques to access environments of interest. The threat...
#CYBERUK23: Threat Posed by ‘Irresponsible’ Use of Commercial Hacking Tools Increasing, NCSC Warns
Spyware, hackers for hire and access to other cyber capabilities such as hacking-as-a-service kits are expected to be in growing demand globally, the UK’s National Cyber...
Raspberry Robin Adopts Unique Evasion Techniques
Threat actors relying on the Raspberry Robin malware have been observed adopting unique evasion techniques to avoid detection. Security researchers at Check Point Research (CPR) published...
Nurse Call Systems, Infusion Pumps Riskiest Connected Medical Devices
Nurse call systems and infusion pumps have been found to be the riskiest connected medical devices, suggests a new report by asset visibility and security company...
ANZ Webinar | What You Don’t Know Can Hurt You: Open Source License Compliance and M&A Activity – Source: www.databreachtoday.com
Source: www.databreachtoday.com – Author: 1. Sam Quakenbush Senior Director – Field Innovation & Strategy, Mend Sam Quakenbush has spent the past 10 years working for cyber...
Why FDA’s New Cyber Device Regs Are a ‘Watershed Moment’ – Source: www.databreachtoday.com
Source: www.databreachtoday.com – Author: 1. Endpoint Security , Events , Healthcare Kevin Fu of Northeastern University on How the Regulations Will Ensure Uniformity Marianne Kolbasuk McGee...
Considerations for Building Successful Security Governance – Source: www.databreachtoday.com
Source: www.databreachtoday.com – Author: 1. Governance & Risk Management , Identity Governance & Administration , IT Risk Management Kaiser Permanente’s Eric Liederman and Steven Frank on...
Ukraine Facing Phishing Attacks, Information Operations – Source: www.databreachtoday.com
Source: www.databreachtoday.com – Author: 1. Cyberwarfare / Nation-State Attacks , Fraud Management & Cybercrime Russia’s Invasion Tactics Include Creating Fake Hacktivist Groups, Researchers Find Mathew J....
WhatsApp, Signal Preview UK Exit Over Threat to Encryption – Source: www.databreachtoday.com
Source: www.databreachtoday.com – Author: 1. Encryption & Key Management , Geo Focus: The United Kingdom , Geo-Specific UK’s Online Safety Bill Criticized for Infringing on Private...
Threat Report Reveals Hope Despite Active Threat Landscape – Source: www.databreachtoday.com
Source: www.databreachtoday.com – Author: 1. Using a Layered Protection Strategy Is the Best Defense Against Cybercrime Grayson Milbourne • April 12, 2023 Companies have...
Cyberattacks Can Cost Enterprises Up to 30% of Operating Income According to ThreatConnect
ARLINGTON, Va. – April 18, 2023 – ThreatConnect, Inc, maker of leading threat intelligence operations (TI Ops) and risk quantification solutions, announced today the release of the...
Report: Over Half of North American Consumers Are Open to Passwordless
TORONTO, April 18, 2023 /PRNewswire/ — 1Password, the leader in human-centric security and privacy, today released its Preparing for a Passwordless Future report. The report revealed a strong consumer appetite for...
Netwrix Annual Security Survey: 68% of Organizations Experienced a Cyberattack Within the Last 12 Months
FRISCO, Texas, April 18, 2023 – Netwrix, a cybersecurity vendor that makes data security easy, today announced the release of its annual global 2023 Hybrid Security Trends Report. It...




























