Russian APT group Winter Vivern targets email portals of NATO and diplomatsRussian hacking group Winter Vivern has been actively exploiting Zimbra flaws to steal the emails...
Cyber Police of Ukraine arrested members of a gang that defrauded EU citizens of $4.33M
Cyber Police of Ukraine arrested members of a gang that defrauded EU citizens of $4.33MThe Cyber Police of Ukraine, with law enforcement officials from Czechia, has...
The UK Government Shares New Strategy to Boost NHS Cybersecurity by 2030
The UK Government Shares New Strategy to Boost NHS Cybersecurity by 2030The Department of Health and Social Care has established a cyber security program aimed at...
Warning: Threat Actors Compromise 3CX Desktop App in a Supply Chain Attack
Warning: Threat Actors Compromise 3CX Desktop App in a Supply Chain AttackAn ongoing supply chain attack allegedly uses a digitally signed and trojanized variant of the...
Best Practices for Effective Identity Lifecycle Management (ILM)
Best Practices for Effective Identity Lifecycle Management (ILM)In today’s fast-paced world, identity management has become a crucial aspect of every organization. From securing sensitive data to...
Smart Grid Fragility, a Constant Threat for the European and American Way of Living
Smart Grid Fragility, a Constant Threat for the European and American Way of LivingIn today’s world, a multitude of smart devices helps us to improve our...
Ukrainian Authorities Stop a Phishing Scam Worth $4.3 million
Ukrainian Authorities Stop a Phishing Scam Worth $4.3 millionUkraine’s Cyberpolice Department announced an operation during which they busted a phishing gang. The police arrested two scammers...
NATO and Diplomats’ Email Portals Targeted by Russian APT Winter Vivern
NATO and Diplomats’ Email Portals Targeted by Russian APT Winter VivernWinter Vivern (aka TA473), a Russian hacking group, has been exploiting vulnerabilities (CVE-2022-27926) in unpatched Zimbra...
3CXDesktopApp Supply Chain Attack Detection: Active Intrusion Campaign Targeting Millions of 3CX Customers
3CXDesktopApp Supply Chain Attack Detection: Active Intrusion Campaign Targeting Millions of 3CX Customers Cybersecurity experts have uncovered an ongoing adversary campaign exploiting 3CXDesktopApp, a software application...
Hack the Pentagon website promotes the benefits of bug bounties to US Military
Hack the Pentagon website promotes the benefits of bug bounties to US MilitaryMy guess is that if you stumbled across a website that called itself "Hack...
Fighting mercenaries with the Cybersecurity Tech Accord
Fighting mercenaries with the Cybersecurity Tech AccordTrend Micro co-Authors Cyber Mercenary Principles to help guide the technology industry and others in dealing with the growing market...
Media disposal policy
Media disposal policyPURPOSE This Media disposal policy from TechRepublic Premium provides specific instructions for ensuring organization data is properly protected when disposing of old storage media....
Consumer lender TMX discloses data breach impacting 4.8 million people
Consumer lender TMX discloses data breach impacting 4.8 million peopleTMX Finance and its subsidiaries TitleMax, TitleBucks, and InstaLoan have collectively disclosed a data breach that exposed...
10-year-old Windows bug with ‘opt-in’ fix exploited in 3CX attack
10-year-old Windows bug with 'opt-in' fix exploited in 3CX attackA 10-year-old Windows vulnerability is still being exploited in attacks to make it appear that executables are...
Hackers exploit bug in Elementor Pro WordPress plugin with 11M installs
Hackers exploit bug in Elementor Pro WordPress plugin with 11M installsHackers are actively exploiting a high-severity vulnerability in the popular Elementor Pro WordPress plugin used by...
Malicious supply chain attack hits 3CX Desktop App
Malicious supply chain attack hits 3CX Desktop AppEXECUTIVE SUMMARY: On Wednesday, cyber security threat intelligence analysts uncovered a supply chain attack targeting the communications software provider...
TikTok: why the app with 1bn users faces a fight for its existence
TikTok: why the app with 1bn users faces a fight for its existenceChinese-owned firm caught in geopolitical standoff, with US lawmakers leading charge against it Sitting...
Failed IT systems at Capita fuel fears of cyber-attack on crucial NHS provider
Failed IT systems at Capita fuel fears of cyber-attack on crucial NHS providerStaff unable to access computers and local authority phone lines knocked out as outsourcing...
Live Webinar | Choosing the Right Encryption Method to Securely Exchange Data
Live Webinar | Choosing the Right Encryption Method to Securely Exchange DataPost ContentRead MoreDataBreachToday.com RSS Syndication
New AlienFox toolkit harvests credentials for tens of cloud services
New AlienFox toolkit harvests credentials for tens of cloud servicesAlienFox is a novel comprehensive toolset for harvesting credentials for multiple cloud service providers, SentinelLabs reported. AlienFox...
Super FabriXss vulnerability in Microsoft Azure SFX could lead to RCE
Super FabriXss vulnerability in Microsoft Azure SFX could lead to RCEResearchers shared details about a flaw, dubbed Super FabriXss, in Azure Service Fabric Explorer (SFX) that...
Solving Cybersecurity Problems Arising in “Difficult Environments of High Uncertainty.”
Solving Cybersecurity Problems Arising in “Difficult Environments of High Uncertainty.”By James Hess, CEO of Unknown Cyber Cybersecurity is a critical issue that affects organizations of all...
Security leaders are finally getting a seat at the table with corporate leadership – make good use of your time there
Security leaders are finally getting a seat at the table with corporate leadership – make good use of your time thereLooking to automation, engaging offensive security,...
As Cyber Attacks Target Large Corporates, Teams Need to Evolve Data Security
As Cyber Attacks Target Large Corporates, Teams Need to Evolve Data SecurityBy Karthikeyan Mariappan, VP of Engineering, Titaniam Chief information security officers (CISOs) and their teams...
Russian Cyberwarfare Documents Leaked
Russian Cyberwarfare Documents LeakedNow this is interesting: Thousands of pages of secret documents reveal how Vulkan’s engineers have worked for Russian military and intelligence agencies to...
Rising Trend of OneNote Documents for Malware delivery
Rising Trend of OneNote Documents for Malware delivery Authored By Anandeshwar Unnikrishnan,Sakshi Jaiswal,Anuradha M McAfee Labs has recently observed a new Malware campaign which used malicious...
Report: Some IT outsourcing is moving back onshore
Report: Some IT outsourcing is moving back onshoreWhile cost is generally the main consideration, the war in Ukraine and global political tensions are prompting companies to...
Ransomware attacks skyrocket as threat actors double down on U.S., global attacks
Ransomware attacks skyrocket as threat actors double down on U.S., global attacksNew studies by NCC Group and Barracuda Networks show threat actors are increasing ransomware exploits,...
Report: Terrible employee passwords at world’s largest companies
Report: Terrible employee passwords at world’s largest companiesFind out the most commonly used weak passwords by industry and country, according to NordPass. Plus, get tips on...
Microsoft adds GPT-4 to its defensive suite in Security Copilot
Microsoft adds GPT-4 to its defensive suite in Security CopilotThe new AI security tool, which can answer questions about vulnerabilities and reverse-engineer problems, is now in...




























