Cybersecurity News


Bait Boost: Phishers Delivering Increasingly Convincing Lures

Bait Boost: Phishers Delivering Increasingly Convincing Lures An intense hunt for corporate account credentials will continue into next quarter, researchers predict.
04 May 2021

Patch issued to tackle critical security issues present in Dell driver software since 2009

Five critical security issues have been discovered.
04 May 2021

Researchers Explore Active Directory Attack Vectors

Incident responders who investigate attacks targeting Active Directory discuss methods used to gain entry, elevate privileges, and control target systems.
03 May 2021

Scripps Health Cyberattack Causes Widespread Hospital Outages

Scripps Health Cyberattack Causes Widespread Hospital Outages The San Diego-based hospital system diverted ambulances to other medical centers after a suspected ransomware attack.
03 May 2021

New Attacks Slaughter All Spectre Defenses 

New Attacks Slaughter All Spectre Defenses  The 3+ years computer scientists spent concocting ways to defend against these supply-chain attacks against chip architecture? It's bound for the dustbin.
03 May 2021

Paving the way: Inspiring Women in Payments - A podcast featuring Anna-Magdalena Kohl

 

She started out pursuing a career in Human Resources, but soon learned it wasn’t the right fit. While pursuing her MBA, Anna-Magdalena Kohl took a chance on a work-study position at an IT security company, even though she had no formal technical training. It was a move that would define her career path. The company, in turn, took a chance on her, investing in her technical education. In this edition of our podcast, Anna-Magdalena explains that even without a technical background, many companies are very supportive and willing to provide on-the-job training opportunities – which can make all the difference in retaining women in the industry.

03 May 2021

Hewlett Packard Enterprise Plugs Critical Bug in Edge Platform Tool

Hewlett Packard Enterprise Plugs Critical Bug in Edge Platform Tool Researchers warned that unpatched versions of HPE’s Edgeline Infrastructure Manager are open to remote authentication-bypass attacks.
03 May 2021

Name That Edge Toon: Magical May

Name That Edge Toon: Magical May Feeling creative? Submit your caption in the comments, and our panel of experts will reward the winner with a $25 Amazon gift card.
03 May 2021

Imperva to Buy API Security Firm CloudVector

The deal is intended to expand Imperva's API security portfolio, officials say.
03 May 2021

Buer Malware Variant Rewritten in Rust Programming Language

Researchers suggest a few reasons why operators rewrote Buer in an entirely new language
03 May 2021

Deepfake Attacks Are About to Surge, Experts Warn

Deepfake Attacks Are About to Surge, Experts Warn New deepfake products and services are cropping up across the Dark Web.
03 May 2021

INTERPOL aims to deal a blow to digital piracy

The agency’s new initiative will also warn about the high cost of the free lunch – the increased risk of malware exposure

The post INTERPOL aims to deal a blow to digital piracy appeared first on WeLiveSecurity

03 May 2021

New Buer Malware Downloader Rewritten in E-Z Rust Language

New Buer Malware Downloader Rewritten in E-Z Rust Language It's coming in emails disguised as DHL Support shipping notices and is apparently getting prepped for leasing on the underground.
03 May 2021

Researchers Find Bugs Using Single-Codebase Inconsistencies

A Northeastern University research team finds code defects -- and some vulnerabilities -- by detecting when programmers used different code snippets to perform the same functions.
03 May 2021

Dark Reading Celebrates 15th Anniversary

Cybersecurity news site begins 16th year with plans to improve site, deliver more content on cyber threats and best practices.
03 May 2021

Stopping the Next SolarWinds Requires Doing Something Different

Will the SolarWinds breach finally prompt the right legislative and regulatory actions on a broader, more effective scale?
03 May 2021

The Edge Pro Tip: Protect IoT Devices

The Edge Pro Tip: Protect IoT Devices As Internet-connected devices become more prevalent in organizations, security issues increase as well.
03 May 2021

Two-Step Verification

Two-step verification (also called two-factor authentication or 2FA) is one of the best steps you can take to secure any account. Two-step verification is when you require both a password and code sent to or generated by your mobile device. At a minimum enable two-step verification for your most important accounts such as email, financial and retirement accounts.
03 May 2021

Ransomware Task Force Publishes Framework to Fight Global Threat

An 81-page report details how ransomware has evolved, along with recommendations on how to deter attacks and disrupt its business model.
30 April 2021

New Threat Group Carrying Out Aggressive Ransomware Campaign

UNC2447 observed targeting now-patched vulnerability in SonicWall VPN.
30 April 2021