Cybersecurity News
7 Steps to Secure a WordPress Site
Many companies operate under the assumption that their WordPress sites are secure -- and that couldn't be anything further from the truth.Hacker leaks data of millions of Teespring users
Teespring account passwords were not released.Hacker Pig Latin: A Base64 Primer for Security Analysts
The Base64 encoding scheme is often used to hide the plaintext elements in the early stages of an attack that can't be concealed under the veil of encryption. Here's how to see through its tricks.Malware reportedly found on laptops given to children in England
Investigation launched after teachers warn of worm on devices handed out for home schooling
An investigation has been launched into reports that some of the laptops handed out to vulnerable children for homeschooling in England are infected with malware.
According to an online forum, teachers from a school in Bradford noticed the issue and believe it contacts Russian servers.
Continue reading...DDoS-Guard To Forfeit Internet Space Occupied by Parler
Parler, the beleaguered social network advertised as a "free speech" alternative to Facebook and Twitter, has had a tough month. Apple and Google removed the Parler app from its stores, and Amazon blocked the platform from using its hosting services. Parler has since found a home in DDoS-Guard, a Russian digital infrastructure company. But now it appears DDoS-Guard is about to be relieved of more than two-thirds of the Internet address space the company leases to clients -- including the Internet addresses currently occupied by Parler.Google Forms Set Baseline For Widespread BEC Attacks
Researchers warn that attackers are collecting reconnaissance for future business email compromise attacks using Google Forms.Rethinking IoT Security: It's Not About the Devices
Keeping IoT safe in the future will require securing the networks themselves. Focusing on the devices is a never-ending battle that will only become more burdensome.Google Searches Expose Stolen Corporate Credentials
A phishing campaign spoofs Xerox notifications to lure victims into clicking on malicious HTML attachments.MrbMiner crypto-mining operation linked to Iranian software firm
Despite the Sophos report ousting the MrbMiner group today, the botnet is expected to continue to operate with impunity.Automated exploit of critical SAP SolMan vulnerability detected in the wild
Proof-of-concept exploit code was published last week.This phishing scam left thousands of stolen passwords exposed through Google search
A mistake on the part of the cyberattackers led to their discovery -- and that of the data they pillaged.Vadokrist: A wolf in sheep’s clothing
Another in our occasional series demystifying Latin American banking trojans
The post Vadokrist: A wolf in sheep’s clothing appeared first on WeLiveSecurity
Microsoft Releases New Info on SolarWinds Attack Chain
Threat actors went to elaborate lengths to maintain operational security around second-stage payload activation, company says.SolarWinds Attack, Cyber Supply Chain Among Priorities for Biden Administration
During Senate confirmation hearings, the nominees for Secretary of Homeland Security and Director of National Intelligence pledged to focus on cybersecurity.Critical Cisco SD-WAN Bugs Allow RCE Attacks
Cisco is stoppering critical holes in its SD-WAN solutions and its smart software manager satellite.DNSpooq bugs expose millions of devices to DNS cache poisoning
Security flaws in a widely used DNS software package could allow attackers to send users to malicious websites or to remotely hijack their devices
The post DNSpooq bugs expose millions of devices to DNS cache poisoning appeared first on WeLiveSecurity