NBA alerts fans of a data breach exposing personal informationThe NBA (National Basketball Association) is notifying fans of a data breach after some of their personal...
Author:
The Week in Ransomware – March 17th 2023 – Shifting to data extortion
The Week in Ransomware - March 17th 2023 - Shifting to data extortionThe fallout from the Clop ransomware attacks on GoAnywhere platforms has become apparent this...
Alleged BreachForums owner ‘Pompompurin’ arrested on cybercrime charges
Alleged BreachForums owner ‘Pompompurin’ arrested on cybercrime chargesU.S. law enforcement arrested on Wednesday a New York man believed to be Pompompurin, the owner of the BreachForums...
2023 Power 100 honorees, highlighting women’s leadership in tech
2023 Power 100 honorees, highlighting women’s leadership in techEXECUTIVE SUMMARY: In a world that’s constantly changing, it’s important to recognize those who are making an impact...
Cisco IOS XR Software for ASR 9000 Series Routers Bidirectional Forwarding Detection Denial of Service Vulnerability
Cisco IOS XR Software for ASR 9000 Series Routers Bidirectional Forwarding Detection Denial of Service VulnerabilityA vulnerability in the bidirectional forwarding detection (BFD) hardware offload feature...
Cisco IOS XR Software Bootloader Unauthenticated Information Disclosure Vulnerability
Cisco IOS XR Software Bootloader Unauthenticated Information Disclosure VulnerabilityA vulnerability in the GRand Unified Bootloader (GRUB) for Cisco IOS XR Software could allow an unauthenticated attacker...
Webinar | Reducing Risk with a Zero Trust Architecture
Webinar | Reducing Risk with a Zero Trust ArchitecturePost ContentRead MoreDataBreachToday.com RSS Syndication
TikTok Says US Threatens Ban Unless Chinese Owners Divest
TikTok Says US Threatens Ban Unless Chinese Owners DivestWestern Governments Cite National Security Concerns as They Restrict TikTok UseTikTok says the Biden administration has demanded that...
What the FTC Is Signaling in Recent Data Privacy Cases
What the FTC Is Signaling in Recent Data Privacy CasesAttorney Kirk Nahra on Where FTC Is Headed in Disputes Such as GoodRx, BetterHelpThe Federal Trade Commission's...
Chinese Hackers Targeting Security and Network Appliances
Chinese Hackers Targeting Security and Network AppliancesFortinet Patches Zero-Day Exploited by Suspected Beijing Hacking Group UNC3886Chinese threat actors are turning security appliances into penetration pathways, forcing...
European Digital Identity Bill Heads to Final Negotiations
European Digital Identity Bill Heads to Final NegotiationsEuropean Parliament and Council of the EU Set to Engage in TrilogueThe European Parliament approved Thursday legislation creating a...
Nuevo HinataBot basado en GoLang que explota fallas de enrutadores y servidores para ataques DDoS.
Nuevo HinataBot basado en GoLang que explota fallas de enrutadores y servidores para ataques DDoS.Se ha observado que una nueva red de bots basada en Golang...
Sitios web parecidos a Telegram y WhatsApp que distribuyen malware
Sitios web parecidos a Telegram y WhatsApp que distribuyen malwareLos sitios web imitadores de aplicaciones de mensajería instantánea como Telegram y WhatApp se están utilizando para...
Una nueva categoría de seguridad aborda las amenazas transmitidas por Internet
Una nueva categoría de seguridad aborda las amenazas transmitidas por InternetEn el entorno de TI corporativo moderno, que se basa en la conectividad en la nube,...
Nuevo bot HinataBot explota fallas de enrutadores y servidores para ataques DDoS
Nuevo bot HinataBot explota fallas de enrutadores y servidores para ataques DDoSSe ha observado que una nueva red de bots basada en Golang denominada HinataBot aprovecha...
Microsoft parcha Zero-Day utilizado por ransomware
Microsoft parcha Zero-Day utilizado por ransomwareEl martes de parches de marzo Microsoft ha publicado correcciones para 76 vulnerabilidades, incluidas 9 correcciones críticas y dos explotadas […]Read...
Google Uncovers 18 Severe Security Vulnerabilities in Samsung Exynos Chips
Google Uncovers 18 Severe Security Vulnerabilities in Samsung Exynos ChipsGoogle is calling attention to a set of severe security flaws in Samsung's Exynos chips, some of...
Winter Vivern APT Group Targeting Indian, Lithuanian, Slovakian, and Vatican Officials
Winter Vivern APT Group Targeting Indian, Lithuanian, Slovakian, and Vatican OfficialsThe advanced persistent threat known as Winter Vivern has been linked to campaigns targeting government officials in India,...
Lookalike Telegram and WhatsApp Websites Distributing Cryptocurrency Stealing Malware
Lookalike Telegram and WhatsApp Websites Distributing Cryptocurrency Stealing MalwareCopycat websites for instant messaging apps like Telegram and WhatApp are being used to distribute trojanized versions and...
A New Security Category Addresses Web-borne Threats
A New Security Category Addresses Web-borne ThreatsIn the modern corporate IT environment, which relies on cloud connectivity, global connections and large volumes of data, the browser...
New GoLang-Based HinataBot Exploiting Router and Server Flaws for DDoS Attacks
New GoLang-Based HinataBot Exploiting Router and Server Flaws for DDoS AttacksA new Golang-based botnet dubbed HinataBot has been observed to leverage known flaws to compromise routers and servers...
Dangerous Android phone 0-day bugs revealed – patch or work around them now!
Dangerous Android phone 0-day bugs revealed – patch or work around them now!Despite its usually inflexible 0-day disclosure policy, Google is keeping four mobile modem bugs...
THN Webinar: 3 Research-Backed Ways to Secure Your Identity Perimeter
THN Webinar: 3 Research-Backed Ways to Secure Your Identity PerimeterThink of the typical portrayal of a cyberattack. Bad guy pounding furiously on a keyboard, his eyes...
The Internet Dilemma: Leveraging the Value While Reducing Vulnerabilities
The Internet Dilemma: Leveraging the Value While Reducing Vulnerabilities Today, an organization’s brand and reputation are intrinsically tied to its data security and privacy protections. Years...
Analysis: Microsoft Patch Tuesday Update for March, 2023
Analysis: Microsoft Patch Tuesday Update for March, 2023Microsoft March “Patch Tuesday” Addresses 86 Security Vulnerabilities Including 2 Known Exploited Vulnerabilities. On March 14th, 2023, Microsoft released...
Using a Cybersecurity Mesh Architecture (CSMA) for SaaS Secu
Using a Cybersecurity Mesh Architecture (CSMA) for SaaS SecuUnlock the power of Cybersecurity Mesh Architecture (CSMA) to enhance SaaS security. Discover how it can improve compliance...
Automating Your Red Team Approach: A Quick Guide
Automating Your Red Team Approach: A Quick GuideYour organization may be prepared for an attack. You may have all the recommended security controls and your employees...
Fairwinds Insights Basics Tutorial: Check Kubernetes Configuration for Privilege Escalation
Fairwinds Insights Basics Tutorial: Check Kubernetes Configuration for Privilege Escalation Securing Kubernetes workloads is a critical aspect of increasing your overall cluster security. The goal is...
COURT DOC: Two Men Charged for Breaching Federal Law Enforcement Database and Posing as Police Officers to Defraud Social Media Companies
COURT DOC: Two Men Charged for Breaching Federal Law Enforcement Database and Posing as Police Officers to Defraud Social Media CompaniesA criminal complaint was unsealed today...
USENIX Security ’22 – Olga Gkountouna, Katerina Doka, Mingqiang Xue, Jianneng Cao, Panagiotis Karras – ‘One-Off Disclosure Control By Heterogeneous Generalization’
USENIX Security ’22 – Olga Gkountouna, Katerina Doka, Mingqiang Xue, Jianneng Cao, Panagiotis Karras – ‘One-Off Disclosure Control By Heterogeneous Generalization’Our thanks to USENIX for publishing...