Scores of Redis Servers Infested by Sophisticated Custom-Built MalwareAt least 1,200 Redis servers worldwide have been infected with "HeadCrab" cryptominers since 2021.Read MoreDark ReadingAt least 1,200...
Author:
Iran-Backed Actor Behind ‘Holy Souls’ Cyberattack on Charlie Hebdo, Microsoft Says
Iran-Backed Actor Behind 'Holy Souls' Cyberattack on Charlie Hebdo, Microsoft SaysThe January attack was in retaliation for the satirical French magazine's decision to launch a cartoon...
What CISOs Can Do About Brand Impersonation Scam Sites
What CISOs Can Do About Brand Impersonation Scam SitesApply these nine tips to proactively fight fraudulent websites that use your brand to rip people off.Read MoreDark...
Name That Edge Toon: For the Birds
Name That Edge Toon: For the BirdsCome up with a clever caption, and our panel of experts will reward the winner with a $25 Amazon gift...
How Cybercriminals Are Operationalizing Money Laundering and What to Do About It
How Cybercriminals Are Operationalizing Money Laundering and What to Do About ItIt's time to share threat intelligence and prioritize digital literacy and cyber hygiene to stem...
Crypto’s Decentralized Finance Security Problem
Crypto's Decentralized Finance Security ProblemAuditing Itself Can;t Ensure SecurityHolding cryptocurrencies in anything but a memory drive inside a box shielded with a Faraday cage was seemingly...
Notorious Finnish Hacker ‘Zeekill’ Busted by French Police
Notorious Finnish Hacker 'Zeekill' Busted by French PoliceAleksanteri Kivimaki Charged With Mental Health Patient Data Breach and ExtortionFrench police arrested hacker Aleksanteri Kivimäki, 25, who's suspected...
Discussion: Mitigating Risks to Customer Account Integrity
Discussion: Mitigating Risks to Customer Account IntegrityTeleSign's Seth Gilpin on Fraud and Risk Management in Customer Account and Device Security.Digital transformation we all have experienced over...
Rising ‘Firebrick Ostrich’ BEC Group Launches Industrial-Scale Cyberattacks
Rising 'Firebrick Ostrich' BEC Group Launches Industrial-Scale CyberattacksThe group's wanton attacks demonstrate that business email compromise is everything a hacker can want in one package: low...
Rising ‘Firebrick Ostrich’ BEC Group Launches Industrial-Scale Cyberattacks
Rising 'Firebrick Ostrich' BEC Group Launches Industrial-Scale CyberattacksThe group's wanton attacks demonstrate that business email compromise is everything a hacker can want in one package: low...
Rising ‘Firebrick Ostrich’ BEC Group Launches Industrial-Scale Cyberattacks
Rising 'Firebrick Ostrich' BEC Group Launches Industrial-Scale CyberattacksThe group's wanton attacks demonstrate that business email compromise is everything a hacker can want in one package: low...
Massive Ransomware Campaign Targets VMware ESXi Servers
Massive Ransomware Campaign Targets VMware ESXi ServersVulnerability Patched in 2021 Still Haunts Admins at Over 300 OrganizationsA massive automated ransomware campaign is targeting VMware ESXi hypervisors...
Rising ‘Firebrick Ostrich’ BEC Group Launches Industrial-Scale Cyberattacks
Rising 'Firebrick Ostrich' BEC Group Launches Industrial-Scale CyberattacksThe group's wanton attacks demonstrate that business email compromise is everything a hacker can want in one package: low...
Rising ‘Firebrick Ostrich’ BEC Group Launches Industrial-Scale Cyberattacks
Rising 'Firebrick Ostrich' BEC Group Launches Industrial-Scale CyberattacksThe group's wanton attacks demonstrate that business email compromise is everything a hacker can want in one package: low...
Cyber Insurer Sees Remote Access, Cloud Databases Under Fire
Cyber Insurer Sees Remote Access, Cloud Databases Under FireReminder: Real-World Attacks Often Focus on Small Subset of Known VulnerabilitiesCriminals lately have been prioritizing two types of...
Indian Official Highlights Djvu Ransomware as Threat
Indian Official Highlights Djvu Ransomware as ThreatDjvu Camouflages Itself as Cracked SoftwareAn Indian cybersecurity official highlighted Djvu ransomware as a threat, saying that "maximum companies" are...
IBM Security GM on Seeing a Target Through the Hacker’s Eyes
IBM Security GM on Seeing a Target Through the Hacker's EyesMary O'Brien on How External Attack Surface Management Finds Internet-Facing IssuesCompanies can be blinded by their...
Hackers Posing as Ukrainian Ministry Deploy Info Stealers
Hackers Posing as Ukrainian Ministry Deploy Info StealersSpoofed Polish Police Websites Also FoundUkrainian and Polish cyber defenders are warning against a slew of phishing websites that...
¿Es segura tu estación de carga EV? Nuevas vulnerabilidades de seguridad descubiertas
¿Es segura tu estación de carga EV? Nuevas vulnerabilidades de seguridad descubiertasDos nuevas debilidades de seguridad descubiertas en varios sistemas de carga de vehículos eléctricos (EV)...
CrowdStrike CEO on Why It’s Tough to Defend Sensitive Assets
CrowdStrike CEO on Why It's Tough to Defend Sensitive AssetsGeorge Kurtz on How Reposify Helps Customers Locate and Safeguard Priority AssetsOrganizations today struggle with both new...
Nuevas vulnerabilidades de alta gravedad descubiertas en los productos Cisco IOx y F5 BIG-IP
Nuevas vulnerabilidades de alta gravedad descubiertas en los productos Cisco IOx y F5 BIG-IPF5 advirtió sobre una falla de alta gravedad que afecta a los dispositivos...
Rising ‘Firebrick Ostrich’ BEC Group Launches Industrial-Scale Cyberattacks
Rising 'Firebrick Ostrich' BEC Group Launches Industrial-Scale CyberattacksThe group's wanton attacks demonstrate that business email compromise is everything a hacker can want in one package: low...
Webinar | 6 Ways to Cut Costs with a Zero Trust Architecture
Webinar | 6 Ways to Cut Costs with a Zero Trust ArchitecturePost ContentRead MoreDataBreachToday.com RSS Syndication
ISMG Editors: Does US Takedown Mark Hive Group’s Demise?
ISMG Editors: Does US Takedown Mark Hive Group's Demise?Also: Russian DDoS Attacks Target US Hospitals; Data Breach Reports Lack DetailsIn the latest weekly update, ISMG editors...
Wiz CEO on the Need to Consolidate Cloud Security Technology
Wiz CEO on the Need to Consolidate Cloud Security TechnologyAssaf Rappaport on Joining Cloud Detection, Vulnerability and Misconfiguration DataThe cloud security landscape has long been fragmented,...
World Economic Forum’s Cybersecurity Outlook 2023 Highlights
World Economic Forum's Cybersecurity Outlook 2023 HighlightsWEF's Seán Doyle on Bridging Gaps Between Security and Business LeadersAccording to the World Economic Forum, geopolitical instability has helped...
Proofpoint CEO on Thwarting Post-Compromise Lateral Movement
Proofpoint CEO on Thwarting Post-Compromise Lateral MovementAshan Willy on Helping Clients Spot Hacker Techniques Insider Their Own 4 WallsProofpoint has focused on preventing cyberattacks, but customers...
Patch Critical Bug Now: QNAP NAS Devices Ripe for the Slaughter
Patch Critical Bug Now: QNAP NAS Devices Ripe for the SlaughterAnalysts find that 98% of QNAP NAS are vulnerable to CVE-2022-27596, which allows unauthenticated, remote SQL...
Live Webinar | Move Fast, Don’t Break Things! The Truth About IAM, VPN Access, & Zero Trust
Live Webinar | Move Fast, Don’t Break Things! The Truth About IAM, VPN Access, & Zero TrustPost ContentRead MoreDataBreachToday.com RSS Syndication
Live Webinar | Hacking Multifactor Authentication: An IT Pro’s Lessons Learned After Testing 150 MFA Products
Live Webinar | Hacking Multifactor Authentication: An IT Pro’s Lessons Learned After Testing 150 MFA ProductsPost ContentRead MoreDataBreachToday.com RSS Syndication





















