Cybersecurity News
Microsoft Exchange Servers Face APT Attack Tsunami
At least 10 nation-state-backed groups are using the ProxyLogon exploit chain to compromise email servers, as compromises mount.11 March 2021
Actionable Tips for Engaging the Board on Cybersecurity
Up your game with your company's board of directors to help them understand your cybersecurity priorities.11 March 2021
Linux Systems Under Attack By New RedXOR Malware
Researchers say the new RedXOR backdoor is targeting Linux systems with various data exfiltration and network traffic tunneling capabilities.11 March 2021
FIN8 Resurfaces with Revamped Backdoor Malware
The financial cyber-gang is running limited attacks ahead of broader offensives on point-of-sale systems.11 March 2021
5 Steps for Investigating Phishing Attacks
Phishing is a common and effective cybercrime tool, but even the most sophisticated threat actors make mistakes that you can leverage in your investigations.11 March 2021
F5, CISA Warn of Critical BIG-IP and BIG-IQ RCE Bugs
The F5 flaws could affect the networking infrastructure for some of the largest tech and Fortune 500 companies - including Microsoft, Oracle and Facebook.11 March 2021
Icon files abused in malspam to spread NanoCore Trojan
.zipx has been employed to deploy both Lokibot and NanoCore malware.11 March 2021
Sex in the digital era: How secure are smart sex toys?
ESET researchers investigate what could possibly go wrong when you connect your bedroom to the internet of things
The post Sex in the digital era: How secure are smart sex toys? appeared first on WeLiveSecurity
11 March 2021
Smart sex toys: appealing to you, exploitable to hackers
Some of the most popular sex toys on the market are anything but smart when it comes to security.11 March 2021
F5 issues BIG-IP patches to tackle unauthenticated remote code execution, critical flaws
Four out of seven vulnerabilities are considered critical.11 March 2021
Sky ECC denies police have ‘cracked’ encrypted messaging platform
Europol, however, says arrests have been made based on monitoring conversation flows.11 March 2021
SAP Stomps Out Critical RCE Flaw in Manufacturing Software
The remote code execution flaw could allow attackers to deploy malware, modify network configurations and view databases.10 March 2021
Fake Ad Blocker Delivers Hybrid Cryptominer/Ransomware Infection
A hybrid Monero cryptominer and ransomware bug has hit 20,000 machines in 60 days.10 March 2021
Malware Operator Employs New Trick to Upload its Dropper into Google Play
Check Point researchers recently discovered the Clast82 dropper hidden in nine legitimate Android utility apps.10 March 2021
Cyberattackers Exploiting Critical WordPress Plugin Bug
The security hole in the Plus Addons for Elementor plugin was used in active zero-day attacks prior to a patch being issued.10 March 2021
US Schools Faced Record Number of Security Incidents in 2020
The K-12 Cybersecurity Resource Center reports an 18% increase in security incidents as schools moved classes online.10 March 2021
'Thousands' of Verkada Cameras Affected by Hacking Breach
Thousands of Verkada cameras have been affected by a breach from a group of hackers, who have reportedly gained access to surveillance systems inside several high-profile companies, police departments, hospitals, prisons and schools.10 March 2021
Multiple Attack Groups Exploited Microsoft Exchange Flaws Prior to the Patches
Researchers have spotted multiple groups exploiting the zero-day Exchange server vulnerabilities.10 March 2021
Hiding in Plain Sight: Protecting Enterprises from the 'New' Shadow IT
Three steps to fight this increasingly vexing problem.10 March 2021
How to Protect Vulnerable Seniors From Cybercrime
According to the FBI, people over the age of 60 lose more money to cybercrime than any other age group. The good news: Safety is only three main tips away.10 March 2021