T-Mobile data breach could be worse than initially thought, 54 million customers impacted
T-Mobile data breach could be worse than initially thought, an update to the investigation reveals that over 54 million individuals were impacted. T-Mobile data breach could be worse than initially […]
Chinese Government Will Begin to Stockpile Zero-Days in September
By Randy Reiter CEO of Don’t Be Breached July 2021 has Been A Busy Month in Cyber Security The Associated Press published on Tuesday, July 13, 2021 that on September […]
Defending Against Increasing DDOS Attacks in The Light Of COVID-19 And 5G
By Amr Alashaal, Regional Vice President – Middle East at A10 Networks Cybercriminals had a busy year in 2020, with rapidly increasing numbers of distributed denial of service (DDoS) weapons, […]
Evaluating Security Practices in Response to Colonial Pipeline And South Korean KAERI Attacks
Zero Trust and Enforcing the Principle of Least Privilege Have Become Crucially Important. By Garret Grajek, CEO, YouAttest In recent news, we have seen several high-profile attacks on major institutions […]
Bronze Optis: Innovative Technologies at Black Hat
By Olivia Gallucci, Cybersecurity Reporter, Cyber Defense Magazine I interviewed approximately sixty industry leaders from over forty companies who attended Black Hat. Although this article series—The Optis—can be read as […]
What is the Main Goal of Penetration Testing?
By Glenn Mabry, Senior Instructor / Tech Researcher for Legends of Tech Digital security is one of the top priorities for today’s business world. The internet has enabled businesses to […]
Vice Society ransomware also exploits PrintNightmare flaws in its attack
Another ransomware gang, the Vice Society ransomware operators, is using Windows print spooler PrintNightmare exploits in its attacks. The Vice Society ransomware operators are actively exploiting Windows print spooler PrintNightmare […]
UNC215, an alleged China-linked APT group targets Israel orgs
China-linked threat actors UNC215 targeted Israeli organizations in a long-running campaign and used false flags to trick victims into believing the attacks was from Iran. A China-linked cyber-espionage group has […]
Australian Cyber Security Centre warns of a surge of LockBit 2.0 ransomware attacks
The Australian Cyber Security Centre (ACSC) warns of a surge of LockBit 2.0 ransomware attacks against Australian organizations starting July 2021. The Australian Cyber Security Centre (ACSC) warns of an escalation in LockBit 2.0 ransomware […]
Conti ransomware affiliate leaked gang’s training material and tools
An affiliate of the Conti RaaS has leaked the training material shared by the group with its network along with the info about one of the operators. An affiliate of […]
Maturity-Based Approach vs. Risk-Based Approach: What’s the Right Answer?
By eSentire The influx of cyber attacks within the past few years have painted a dire image for the C-suite and the boardroom. As cyber risks grow in number and […]
Is The Cloud Leaving You Exposed?
Exploring the public cloud and addressing its unanticipated security challenges By Chuck Slate, Lead Architect, Attivo Networks, Inc. On a traditional network, user accounts are the main identity type and, […]
Reshaping the future of transportation with the ITS World Congress
The pandemic, lockdowns and economic fallout threw into stark relief the inadequacies of systems and processes worldwide. As more and more organizations look to digital tech to transform their operations, […]
How to Accelerate SecOps efficiency and extend capabilities with XDR
By Ed Martin, Director of Product Management, Secureworks Security Operations (SecOps) teams have been under pressure since their inception to perform the role of enterprise defender for firms in every […]
Cloud Security Automation: The Fastest Path to Zero Trust
By John Vecchi, CMO, Anitian Zero Trust Security has made its way into the offerings of most enterprise security companies while becoming a critical and new modern architecture adopted by the Department of Defense (DoD) and […]
IBM Cost of a Data Breach study: Cost of a Data Breach hits record high during pandemic
The ‘Cost of a Data Breach’ report commissioned by IBM Security states that the cost of a data breach exceeded $4.2 million during the COVID19 pandemic. IBM Security presented today […]
XCSSET MacOS malware targets Telegram, Google Chrome data and more
XCSSET macOS malware continues to evolve, now it is able to steal login information from multiple apps, including Telegram and Google Chrome. Security researchers from Trend Micro continues to monitor […]
New enhanced Joker Malware samples appear in the threat landscape
The Joker mobile trojan is back, experts spotted multiple malicious apps on the official Google Play store that were able to evade scanners. Experts reported an uptick in malicious Android […]
BIOPASS malware abuses OBS Studio to spy on victims
Researchers spotted a new malware, dubbed BIOPASS, that sniffs victim’s screen by abusing the framework of Open Broadcaster Software (OBS) Studio. Researchers from Trend Micro spotted a new malware, dubbed BIOPASS, that […]
The Mobile Attack Pyramid
Identifying Attack Surfaces is Key to Protecting Mobile Applications By David Stewart, CEO, Approov, Inc. A regular pyramid has 5 surfaces, 4 sloping ones and another as its base. In […]
REvil ransomware gang demands $70M for universal decryptor for Kaseya victims
REvil ransomware is demanding $70 million for decrypting all systems locked during the Kaseya supply-chain ransomware attack. REvil ransomware is asking $70 million worth of Bitcoin for decrypting all systems […]
REvil gang exploited a zero-day in the Kaseya supply chain attack
Kaseya was addressing the zero-day vulnerability that REvil ransomware gang exploited to breach on-premise Kaseya VSA servers. A new supply chain attack made the headlines, on Friday the REvil ransomware […]
Linux version of REvil ransomware targets ESXi VM
The REvil ransomware operators added a Linux encryptor to their arsenal to encrypt Vmware ESXi virtual machines. The REvil ransomware operators are now using a Linux encryptor to encrypts Vmware […]
Cybersecurity in Healthcare: Benefits, Examples, and Usage Tips Healthcare cybersecurity framework
By Kate Orekhova, Cleveroad company Health organizations deal with a large amount of sensitive personal information. That’s why they face challenges complying with tightening regulations, and they’re constantly combating increased […]
In the Midst of COVID-19, We’re Seeing a Pandemic of Cyber Attacks
By Babur Khan, Technical Marketing Engineer – Enterprise Security at A10 Networks In the first quarter of 2021, the COVID-19 pandemic is still wreaking havoc around the globe. The coronavirus […]
Why A ‘Layers and Lists’ Approach to Cybersecurity Is Doomed to Fail
By Gary Fischer, VP Americas, XM Cyber Why is cyber-defense such an asymmetrical war? Hackers can launch a barrage of attacks on a single target and keep going until they find […]
ChaChi, a GoLang Trojan used in ransomware attacks on US schools
A new Trojan written in the Go programming language, tracked as ChaChi, was involved in ransomware attacks against government agencies and US schools. Researchers from BlackBerry Threat Research and Intelligence […]
Overcoming Security as a Barrier to Cloud Adoption
By Ron Newman, SVP at NTT Ltd. Security Division The last year has forced organizations into change, both planned and unplanned. Companies have had to pivot, rethink their business strategies […]
Three things’ organizations must do to secure “passwordless”
By Jerome Becquart, COO, Axiad The pandemic forced organizations to accelerate their journey to passwordless with secure authentication methods such as multi factor authentication (MFA), as individuals were expected to […]
Norway blames China-linked APT31 for 2018 government hack
Norway police secret service states said that China-linked APT31 group was behind the 2018 cyberattack on the government’s IT network. Norway’s Police Security Service (PST) said that the China-linked APT31 […]