A research engineer used basic exfiltration techniques to steal trade secrets from Coca-Cola, but wasn’t caught until she attempted to steal similar data from another company....
Author: admin
CSO Online – How data poisoning attacks corrupt machine learning models
Data poisoning can render machine learning models inaccurate, possibly resulting in poor decisions based on faulty outputs. With no easy fixes available, security pros must focus...
WeLive Security – FBI: Cybercrime losses topped US$4.2 billion in 2020
The Bureau received over 28,000 reports of COVID-19-themed scams last year Amer Owaida18 Mar 2021 – 05:23PMShare The United States’ Federal Bureau of Investigation (FBI) received...
Welive Security – $38 million worth of gift cards stolen and sold on dark web
Easy to redeem and hard to trace, gift cards remain a hot commodity in the criminal underground Amer Owaida7 Apr 2021 – 07:00PMShare A cybercriminal has...
WeLive Security – Does data stolen in a data breach expire?
Some personal information just doesn’t age – here’s what the Facebook data leak may mean for you Tony Anscombe8 Apr 2021 – 03:00PMShare ‘Half a billion...
Telefonica TECH – What Do Criminals in the Ransomware Industry Recommend so that Ransomware Does Not Affect You?
Gabriel Bergel 9 February, 2021 This post is about zombies and social engineering, the image in figure 1 is free and royalty free as long as you...
Telefonica TECH – WhatsApp, Telegram or Signal, Which One?
ElevenPaths 17 February, 2021 In the world of smartphones, 2021 began with a piece of news that has left no one indifferent: the update of WhatsApp’s terms and...
Telefonica TECH – Everything You Need to Know About SSL/TLS Certificates
ElevenPaths 23 March, 2021 What is a digital certificate? Secure Sockets Layer/Transport Layer Security digital certificate is the most widely used security protocol that enables encrypted data transfer...
Telefonica TECH – No Pain, No Gain: Let´s Hack 2021
ElevenPaths 8 April, 2021 “No pain, no gain”, you have probably heard this on more than one occasion. An expression that is used endlessly in different environments,...
Telefonica TECH – Cyber Security Mechanisms for Everyday Life
ElevenPaths 26 March, 2021 It is becoming more and more common to find in the general media news related to cyber-attacks, data breaches, privacy scandals and, in short, all...
The Hacker News – Windows, Ubuntu, Zoom, Safari, MS Exchange Hacked at Pwn2Own 2021
Windows, Ubuntu, Zoom, Safari, MS Exchange Hacked at Pwn2Own 2021 April 12, 2021Ravie Lakshmanan The 2021 spring edition of Pwn2Own hacking contest concluded last week on April 8...
The Hacker News – Alert — There’s A New Malware Out There Snatching Users’ Passwords
A previously undocumented malware downloader has been spotted in the wild in phishing attacks to deploy credential stealers and other malicious payloads. Dubbed “Saint Bot,” the...
naked security – Apple devices get urgent patch for zero-day exploit – update now!
Apple devices get urgent patch for zero-day exploit – update now! 27 MAR 2021 7Apple, Apple Safari, iOS, Vulnerability Get the latest security news in your inbox. Don’t show me this...
threadpost – Chinese Hackers Selling Intimate Stolen Camera Footage
Chinese Hackers Selling Intimate Stolen Camera Footage Author:Becky BrackenApril 6, 2021 4:54 pm2:30 minute read Write a comment Share this article: A massive operation offers access to hacked camera...
threadpost – Critical Cloud Bug in VMWare Carbon Black Allows Takeover
Critical Cloud Bug in VMWare Carbon Black Allows Takeover Author:Tara SealsApril 6, 2021 4:55 pm1:30 minute read Write a comment Share this article: CVE-2021-21982 affects a platform designed to...
threadpost – How To Defend the Extended Network Against Web Risks
How To Defend the Extended Network Against Web Risks InfoSec InsiderAamir LakhaniApril 5, 2021 1:28 pm3 minute read Write a comment Share this article: Aamir Lakhani, cybersecurity researcher for...
threadpost – SAP Bugs Under Active Cyberattack, Causing Widespread Compromise
SAP Bugs Under Active Cyberattack, Causing Widespread Compromise Author:Tara SealsApril 6, 2021 2:47 pm5 minute read Write a comment Share this article: Cyberattackers are actively exploiting known security vulnerabilities...
DARKReading – Kaspersky Uncovers New APAC Cyberespionage Campaign
A group related to Chinese-speaking threat group Cycldek is targeting government and military organizations in Vietnam. Kaspersky researchers have uncovered an advanced cyberespionage campaign targeting government...
DARKReading – 9 Modern-Day Best Practices for Log Management
Log management is nothing new. But doing so smartly, correctly, and concisely in today’s data-driven world is another story.(Image: 123tin via Adobe Stock) Logs are central...
Schneier on Security – Malware Hidden in Call of Duty Cheating Software
Most troublingly, Activision says that the “cheat” tool has been advertised multiple times on a popular cheating forum under the title “new COD hack.” (Gamers looking...
Schneier on Security – Wi-Fi Devices as Physical Object Sensors
The new 802.11bf standard will turn Wi-Fi devices into object sensors: In three years or so, the Wi-Fi specification is scheduled to get an upgrade that will turn...
DARKReading – DDoS’s Evolution Doesn’t Require a Security Evolution
They may have grown in sophistication, with more widespread consequences, yet today’s distributed denial-of-service attacks can still be fought with conventional tools.(Image: Alexey Novikov via Adobe...
WeLive Security – COVID-19 critical industries suffer spike in security incidents
Organizations expanded their cloud workload deployments following the onset of the pandemic, but they also saw more cloud security incidents. Such incidents in the retail, manufacturing...
DARKReading – Security Falls Short in Rapid COVID Cloud Migration
he quick pivot to the cloud for remote support also ushered in risks. Business leaned hard into the cloud during the start of the COVID-19 pandemic...
DARKReading – Microsoft Teams, Exchange Server, Windows 10 Hacked in Pwn2Own 2021
The 2021 Pwn2Own is among the largest in its history, with 23 separate entries targeting 10 products. Pwn2Own 2021 kicked off this week with successful attempts...
WeLive Security – Almost $2 billion lost to BEC scams in 2020
Losses emanating from Business Email Compromise (BEC) and Email Account Compromise (EAC) scams surpassed US$1.86 billion last year, which is more than the combined losses stemming from the...
By Onapsis: Watch Out! Mission Critical SAP Applications Are Under Active Attack
Cyber attackers are actively setting their sights on unsecured SAP applications in an attempt to steal information and sabotage critical processes, according to new research. “Observed...
Hackers From China Target Vietnamese Military and Government
A hacking group related to a Chinese-speaking threat actor has been linked to an advanced cyberespionage campaign targeting government and military organizations in Vietnam. The attacks...
THN – 533 Million Facebook Users’ Phone Numbers and Personal Data Leaked Online
In what’s likely to be a goldmine for bad actors, personal information associated with approximately 533 million Facebook users worldwide has been leaked on a popular...