Cybersecurity News


Experian South Africa discloses data breach impacting 24 million customers

Experian said the attacker was identified and its data deleted from the fraudster's devices.
19 August 2020

10 Resume and Interview Tips from Security Pros

10 Resume and Interview Tips from Security Pros Experts from the DEF CON Career Hacking Village explain how job seekers can build a resume and rock an interview.
19 August 2020

Fuzzing Services Help Push Technology into DevOps Pipeline

As part of a continuous testing approach, fuzzing has evolved to provide in-depth code checks for unknown vulnerabilities before deployment.
19 August 2020

Researchers Warn of Flaw Affecting Millions of IoT Devices

Researchers Warn of Flaw Affecting Millions of IoT Devices A patch has been issued for the flaw in a widely-used module, and researchers are urging IoT manufacturers to update their devices ASAP.
19 August 2020

FritzFrog Botnet Attacks Millions of SSH Servers

FritzFrog Botnet Attacks Millions of SSH Servers The unique, advanced worming P2P botnet drops backdoors and cryptominers, and is spreading globally.
19 August 2020

CISA warns of BLINDINGCAN, a new strain of North Korean malware

Malware was used in a series of attacks targeting the US defense and aerospace sectors.
19 August 2020

Sophisticated P2P Botnet Targeting SSH Servers

'FritzFrog' is fileless, uses its own proprietary P2P implementation, and has breached at least 500 servers so far, Guardicore says.
19 August 2020

CISA Warns of New RAT Aimed at US Defense Contractors

Hidden Cobra, an APT group associated with the government of North Korea, is thought to be behind the campaign.
19 August 2020

Newly Patched Alexa Flaws a Red Flag for Home Workers

Alexa could serve as an entry point to home and corporate networks. Security experts point to the need for manufacturers to work closely with enterprise security teams to spot and shut down IoT device flaws.
19 August 2020

ICS Vulnerability Reports Rapidly Rise

More scrutiny of products for industrial control systems is expected to expose even more weaknesses in devices that run critical infrastructure.
19 August 2020

How to Control Security Costs During a Down Economy

Three key areas security professionals should watch when managing their budgets.
19 August 2020

Tens of suspects arrested for cashing-out Santander ATMs using software glitch

Santander says it fixed the ATM software glitch that was exploited this week across the tri-state area.
19 August 2020

Stolen Data: The Gift That Keeps on Giving

Stolen Data: The Gift That Keeps on Giving Users regularly reuse logins and passwords, and data thieves are leveraging that reality to breach multiple accounts.
19 August 2020

Voice Phishers Targeting Corporate VPNs

The COVID-19 epidemic has brought a wave of email phishing attacks that try to trick work-at-home employees into giving away credentials needed to remotely access their employers' networks. But one increasingly brazen group of crooks is taking your standard phishing attack to the next level, marketing a voice phishing service that uses a combination of one-on-one phone calls and custom phishing sites to steal VPN credentials from employees.
19 August 2020

WannaRen ransomware author contacts security firm to share decryption key

A major ransomware outbreak hit China back in April.
19 August 2020

Airline DMARC Policies Lag, Opening Flyers to Email Fraud

Airline DMARC Policies Lag, Opening Flyers to Email Fraud Up to 61 percent out of the IATA (International Air Transport Association) airline members do not have a published DMARC record.
19 August 2020

The Sounds a Key Make Can Produce 3D-Printed Replica

The Sounds a Key Make Can Produce 3D-Printed Replica Researchers reveal technology called SpiKey that can ‘listen’ to the clicks a key makes in a lock and create a duplicate from the sounds.
19 August 2020

Facebook sued over fact-check messages on anti-vaccination posts

The CHD claims Facebook is “censoring truthful public health posts.”
19 August 2020

New FritzFrog P2P botnet has breached at least 500 enterprise, government servers

The botnet kills off competing processes on Linux systems before mining cryptocurrency.
19 August 2020

How to prepare and protect your digital legacy

It's never too soon to plan for what will happen to your digital presence after you pass away

The post How to prepare and protect your digital legacy appeared first on WeLiveSecurity

19 August 2020