Cybersecurity News
PDF Feature ‘Certified’ Widely Vulnerable to Attack

26 May 2021
VMware Sounds Ransomware Alarm Over Critical Severity Bug

26 May 2021
Bluetooth bugs could allow attackers to impersonate devices
Patches to remedy the vulnerabilities should be released over the coming weeks
The post Bluetooth bugs could allow attackers to impersonate devices appeared first on WeLiveSecurity
26 May 2021
Cisco: Reduced Complexity in the SOC Improves Enterprise Security
SPONSORED: WATCH NOW -- All it took was a global pandemic and a shift to working from home to expose security operations centers' open secret: Too much software, systems, and data to filter. Dug Song, chief strategy officer of Cisco Secure, makes a strong case for why reducing that complexity is the only tenable way forward for security professionals.26 May 2021
BazaLoader Masquerades as Movie-Streaming Service

26 May 2021
Bug Bounties and the Cobra Effect
Are bug bounty programs allowing software companies to skirt their responsibility to make better, more secure products from the get-go?26 May 2021
How Are Cyber Insurance Companies Assessing Ransomware Risk?

26 May 2021
Devo: SIEM Continues to Evolve with Tech Trends and Emerging Threats
SPONSORED: WATCH NOW -- Some organizations split the difference with a hybrid of premises- and cloud-based SIEM, says Ted Julian, senior VP of product at Devo. As security data volumes continue to increase, SIEM's evolution will only continue.26 May 2021
Messaging Apps: The Latest Hotbed in the Fraud Ecosystem
Telegram and other secure messaging apps have become a haven for professional criminals to wreak havoc and turn a profit.26 May 2021
New Iranian Threat Actor Using Ransomware, Wipers in Destructive Attacks
The Agrius group's focus appears to be Israel and the Middle East.26 May 2021
‘Privateer’ Threat Actors Emerge from Cybercrime Swamp

26 May 2021
A Peek Inside the Underground Ransomware Economy

26 May 2021
Orange: Your Leaky Security is Coming from Inside the House!
SPONSORED: Your home WiFi router may be screaming fast, but it's also a major point of vulnerability in this work-from-home era, says Charl van der Walt, head of security research at Orange Cyberdefense. And while Zero Trust offers some relief, he offers up some how-to advice to ensure it's properly deployed.26 May 2021
Bluetooth bugs open the door for attackers to impersonate devices
Devices supporting the Bluetooth Core and Mesh specifications are impacted.26 May 2021
Russian national jailed for running stolen data, hijacked account seller platform deer.io
Kirill Victorovich Firsov was arrested by the FBI last year.26 May 2021
CEO Fraud
CEO Fraud / BEC is a type of targeted email attack. It commonly involves a cyber criminal pretending to be your boss or a senior leader and then tricking you into sending the criminal highly sensitive information, buying gift cards or initiating a wire transfer. Be highly suspicious of any emails demanding immediate action and/or asking you to bypass any security procedures.26 May 2021
Cloud Compromise Costs Organizations $6.2M Per Year
Organizations reported an average of 19 cloud-based compromises in the past year, but most don't evaluate the security of SaaS apps before deployment.25 May 2021
Russia Profiting from Massive Hydra Cybercrime Marketplace
An analysis of Bitcoin transactions from the Hydra marketplace show that the operators are locking sellers into Russian exchanges, likely fueling profits for local actors.25 May 2021
Rise in Opportunistic Hacks and Info-Sharing Imperil Industrial Networks

25 May 2021
Threat Actor ‘Agrius’ Emerges to Launch Wiper Attacks Against Israeli Targets

25 May 2021