Cybersecurity News


CEO Fraud

CEO Fraud / BEC is a type of targeted email attack. It commonly involves a cyber criminal pretending to be your boss or a senior leader and then tricking you into sending the criminal highly sensitive information, buying gift cards or initiating a wire transfer. Be highly suspicious of any emails demanding immediate action and/or asking you to bypass any security procedures.
26 May 2021

Cloud Compromise Costs Organizations $6.2M Per Year

Organizations reported an average of 19 cloud-based compromises in the past year, but most don't evaluate the security of SaaS apps before deployment.
25 May 2021

Russia Profiting from Massive Hydra Cybercrime Marketplace

An analysis of Bitcoin transactions from the Hydra marketplace show that the operators are locking sellers into Russian exchanges, likely fueling profits for local actors.
25 May 2021

Rise in Opportunistic Hacks and Info-Sharing Imperil Industrial Networks

Rise in Opportunistic Hacks and Info-Sharing Imperil Industrial Networks Security researchers at Mandiant have seen an increasing wave of relatively simplistic attacks involving ICS systems - and attackers sharing their finds with one another - since 2020.
25 May 2021

Threat Actor ‘Agrius’ Emerges to Launch Wiper Attacks Against Israeli Targets

Threat Actor ‘Agrius’ Emerges to Launch Wiper Attacks Against Israeli Targets The group is using ransomware intended to make its espionage and destruction efforts appear financially motivated.
25 May 2021

MacOS Zero-Day Let Attackers Bypass Privacy Preferences

Apple has released security patches for vulnerabilities in macOS and tvOS that reports indicate have been exploited in the wild.
25 May 2021

Axis Fosters Work-From-Home Momentum with Zero Trust Network Access

SPONSORED: Watch now -- VPN and VDI, while still useful, lack the hardened security required to keep users secure. That's created an opening for Zero Trust network access.
25 May 2021

Russian Sentenced to 30 Months for Running Criminal Website

FBI says sales from illicit online shop deer.io exceeded $17 million
25 May 2021

Your Network's Smallest Cracks Are Now Its Biggest Threats

Bad actors have flipped the script by concentrating more on low-risk threats. Here's how to address the threat and the tactics.
25 May 2021

Trend Micro Bugs Threaten Home Network Security

Trend Micro Bugs Threaten Home Network Security The security vendor's network management and threat protection station can open the door to code execution, DoS and potential PC takeovers.
25 May 2021

Uptycs Offers Resilience Formula to Boost Business Continuity

SPONSORED CONTENT: Breaches and data loss are inevitable, but customers can bounce back more readily with some planning and foresight, says Ganesh Pai, CEO and founder of Uptycs. He suggests a trajectory for customers looking to improve their own resilience, starting with proactiveness, followed by reactivity, then predictive capabilities and better protection.
25 May 2021

The Makings of a Better Cybersecurity Hire

The Makings of a Better Cybersecurity Hire Experience counts, but as one CISO has learned, don't overlook a creative, motivated candidate just because their background doesn't match the job description.
25 May 2021

Combatting Insider Threats with Keyboard Security

Combatting Insider Threats with Keyboard Security Dale Ludwig, business development manager at Cherry Americas, discusses advances in hardware-based security that can enhance modern cyber-defenses.
25 May 2021

Bose Admits Ransomware Hit: Employee Data Accessed

Bose Admits Ransomware Hit: Employee Data Accessed The consumer-electronics stalwart was able to recover without paying a ransom, it said.
25 May 2021

Pulse Secure VPNs Get Quick Fix for Critical RCE

Pulse Secure VPNs Get Quick Fix for Critical RCE One of the workaround XML files automatically deactivates protection from an earlier workaround: a potential path to older vulnerabilities being opened again.
25 May 2021

Not as complex as we thought: Cyberattacks on operational technology are on the rise

Common techniques are setting a low bar for attacks on control processes. Sometimes, attackers have no idea what the system is used for.
25 May 2021

The Adversary Within: Preventing Disaster From Insider Threats

Insiders are in a position of trust, and their elevated permissions provide opportunities to cause serious harm to critical business applications and processes.
25 May 2021

Apple Patches Zero-Day Flaw in MacOS that Allows for Sneaky Screenshots

Apple Patches Zero-Day Flaw in MacOS that Allows for Sneaky Screenshots Security researchers at Jamf discovered the XCSSET malware exploiting the vulnerability, patched in Big Sur 11.4, to take photos of people’s computer screens without their knowing.
25 May 2021

Businesses Boost Security Budgets. Where Will the Money Go?

Most organizations plan to spend more on security, leaders say in a report that explores their toughest challenges, post-breach costs, and spending priorities.
25 May 2021