Cybersecurity News


Ragnarok Ransomware Hits Boggi Milano Menswear

Ragnarok Ransomware Hits Boggi Milano Menswear The ransomware gang exfiltrated 40 gigabytes of data from the fashion house, including HR and salary details.
01 April 2021

Solving the Leadership Buy-In Impasse With Data

Justify your requirements with real numbers to get support for security investments.
01 April 2021

Building a Fortress: 3 Key Strategies for Optimized IT Security

Building a Fortress: 3 Key Strategies for Optimized IT Security Chris Hass, director of information security and research at Automox, discusses how to shore up cybersecurity defenses and what to prioritize.
01 April 2021

How to Build a Resilient IoT Framework

How to Build a Resilient IoT Framework For all of their benefits, IoT devices weren't built with security in mind -- and that can pose huge challenges.
01 April 2021

Google: North Korean APT Gearing Up to Target Security Researchers Again

Google: North Korean APT Gearing Up to Target Security Researchers Again Cyberattackers have set up a website for a fake company called SecuriElite, as well as associated Twitter and LinkedIn accounts.
01 April 2021

The Role of Visibility in Securing Cloud Applications

The Role of Visibility in Securing Cloud Applications Traditional data center approaches aren't built for securing modern cloud applications.
01 April 2021

Is your dishwasher trying to kill you?

Does every device in your home really need to be connected to the internet? And could it be turned against you?

The post Is your dishwasher trying to kill you? appeared first on WeLiveSecurity

01 April 2021

DeepDotWeb dark web admin pleads guilty to gun, drug purchase kickbacks

Over $8 million was earned through affiliate marketing for illegal marketplaces.
01 April 2021

Google: North Korean hackers are targeting researchers through fake offensive security firm

Google TAG warns of the group using zero-day exploits after reaching out to targets on social media.
01 April 2021

Top 5 Attack Techniques May be Easier to Detect Than You Think

New analysis shows attackers for the most part are continuing to rely on the same techniques and tactics they have been using for years.
31 March 2021

Google Updates on Campaign Targeting Security Researchers

Attackers linked to North Korea began to target security researchers on social media earlier this year.
31 March 2021

What's So Great About XDR?

XDR is a significant advance in threat detection and response technology, but few enterprises understand why. Omdia identifies four catalysts driving the emergence of XDR.
31 March 2021

83% of Businesses Hit With a Firmware Attack in Past Two Years

A new Microsoft-commissioned report finds less than 30% of organizations allocate security budget toward preventing firmware attacks.
31 March 2021

Apple, Google Both Track Mobile Telemetry Data, Despite Users Opting Out

Apple, Google Both Track Mobile Telemetry Data, Despite Users Opting Out Google’s Pixel and Apple’s iPhone both in privacy hot seat for siphoning mobile device data without consent.
31 March 2021

Fraud Ring Lauders Money Via Fake Charity Donations

Fraud Ring Lauders Money Via Fake Charity Donations The Cart Crasher gang is testing stolen payment cards while cleaning ill-gotten funds.
31 March 2021

Child Tweets Gibberish from U.S. Nuke Account

Child Tweets Gibberish from U.S. Nuke Account Telecommuting social-media manager for the U.S. Strategic Command left the laptop open and unsecured while stepping away.
31 March 2021

College Students Targeted in Newest IRS Scam

The Internal Revenue Service warns of fraudulent emails sent to .edu addresses.
31 March 2021

Advice From Security Experts: How to Approach Security in the New Normal

Here are the biggest lessons they've learned after a year of work from home, and how they advise their counterparts at organizations to proceed as a result of those lessons.
31 March 2021

3 Ways Vendors Can Inspire Customer Trust Amid Breaches

As customers rely more on cloud storage and remote workforces, the probability of a breach increases.
31 March 2021

Weakness in EDR Tools Lets Attackers Push Malware Past Them

A technique called hooking used by most endpoint detection and response products to monitor running processes can be abused, new research shows.
31 March 2021