Cybersecurity News
RSA Spins Off Fraud & Risk Intelligence Unit
The new company, called Outseer, will continue to focus on payment authentication and fraud detection and analysis.09 June 2021
CISA Addresses Rise in Ransomware Threatening OT Assets
The agency has released guidance in response to a rise of ransomware attacks affecting OT assets and control systems.09 June 2021
New Security Event @Hack to Take Place in Saudi Arabia
The Saudi Federation of Cybersecurity, Programming, and Drones (SAFCSP) and Informa Tech will launch a multi-day event in Riyadh this November.09 June 2021
Mysterious Custom Malware Collects Billions of Stolen Data Points
A nameless malware resulted in a huge data heist of files, credentials, cookies and more that researchers found collected into a cloud database.09 June 2021
With Cloud, CDO and CISO Concerns Are Equally Important
Navigated properly, a melding of these complementary perspectives can help keep an organization more secure.09 June 2021
Intel Plugs 29 Holes in CPUs, Bluetooth, Security
The higher-rated advisories focus on privilege-escalation bugs in CPU firmware: Tough to patch, hard to exploit, tempting to a savvy attacker.09 June 2021
Hardening the Physical Security Supply Chain to Mitigate the Cyber-Risk
Nick Smith, Regional Manager at Genetec, details how physical security professionals can improve their resilience to cyberattacks by reviewing the cybersecurity policies of those they work with in the supply chain. This includes everyone from component vendors to installers and engineers.09 June 2021
Ransomware Is Not the Problem
Arbitrarily powerful software -- applications, operating systems -- is a problem, as is preventing it from running on enterprise systems.09 June 2021
DarkSide Pwned Colonial With Old VPN Password
Attackers accessed a VPN account that was no longer in use to freeze the company’s network in a ransomware attack whose repercussions are still vibrating.09 June 2021
Gelsemium: When threat actors go gardening
ESET researchers shed light on new campaigns from the quiet Gelsemium group
The post Gelsemium: When threat actors go gardening appeared first on WeLiveSecurity
09 June 2021
Apple pays millions of dollars to student after repair staff leak her explicit photos online
Sensitive photos were accessed and leaked by workers repairing her iPhone.09 June 2021
PuzzleMaker attacks exploit Windows zero-day, Chrome vulnerabilities
Two of the zero-days used were patched by Microsoft on Tuesday.09 June 2021
Got Backups?
Eventually, we all have an accident or get hacked. And when we do, backups are often the only way to recover. Backups are cheap and easy; make sure you are backing up all of your personal information at home (such as family photos) on a regular basis.09 June 2021
Phished Account Credentials Mostly Verified in Hours
Almost two-thirds of all phished credentials are verified by attackers within a day and then used in a variety of schemes, including business email compromise and targeting other users with malicious code.08 June 2021
Microsoft Patch Tuesday Fixes 6 In-The-Wild Exploits, 50 Flaws
Researchers discovered a highly targeted malware campaign launched in April, in which a new, unknown threat actor used two of the vulnerabilities that Microsoft said are under active attack.08 June 2021
Microsoft Patches 6 Zero-Days Under Active Attack
The June 2021 Patch Tuesday fixes 50 vulnerabilities, six of which are under attack and three of which were publicly known at the time of disclosure.08 June 2021
Microsoft Patches Six Zero-Day Security Holes
Microsoft today released another round of security updates for Windows operating systems and supported software, including fixes for six zero-day bugs that malicious hackers already are exploiting in active attacks.08 June 2021
FBI Issued Encrypted Devices to Capture Criminals
A sting operation delivered devices into the hands of global criminals and used the intelligence gathered to stop drug crimes.08 June 2021
FBI Issues Encrypted Devices to Capture Criminals
A sting operation delivered devices into the hands of global criminals and used the intelligence gathered to stop drug crimes.08 June 2021
Lewd Phishing Lures Aimed at Business Explode
Socially engineered BEC attacks using X-rated material spike 974 percent.08 June 2021