Cybersecurity News
COVID-19 Creates Opening for OT Security Reform
Operations technology was once considered low risk, at least until the virus came along and re-arranged the threat landscape.Phishing Attack Targets Microsoft 365 Users With Netflix & Amazon Lures
Cyberattacker TA2552 primarily targets Spanish speakers with messages that leverage a narrow range of themes and popular brands.Facebook Small Business Grants Spark Identity-Theft Scam
The cybercrooks spread the COVID-19 relief scam via Telegram and WhatsApp, and ultimately harvest account credentials and even pics of IDs.Windows XP leak confirmed after user compiles the leaked code into a working OS
The Windows XP source code that leaked last week is incomplete, lacking some components, but is authentic.GitHub rolls out new Code Scanning security feature to all users
New Code Scanning feature will tell GitHub users when they've added known security flaws in their codeLinkury adware caught distributing full-blown malware
Linkury (SafeFinder) installations linked to infections with the Socelars and Kpot infostealer trojans.Microsoft 365 services back online after hours‑long outage
Microsoft resolves a service disruption that affected Office 365, Outlook.com, Teams and other cloud-based services
The post Microsoft 365 services back online after hours‑long outage appeared first on WeLiveSecurity
Microsoft Exchange Servers Still Open to Actively Exploited Flaw
Despite Microsoft issuing patches almost eight months ago, 61 percent of Exchange servers are still vulnerable.The Value of the PCI Secure Software Lifecycle Standard for Software Vendors
The PCI Secure Software Lifecycle (Secure SLC) Standard is part of the PCI Software Security Framework, which addresses security for software operating in payment environments. In this blog, we interview PCI Security Standards Council’s VP, Global Head of Programs, Gill Woodcock, about the Secure SLC Standard, what it is, and the value of adoption.
Attacker Dwell Time: Ransomware's Most Important Metric
How to bolster security defenses by zeroing in on the length of time an interloper remains undetected inside your network$15 million business email scam campaign in the US exposed
The FBI is investigating the global campaign in which millions of dollars have been stolen from at least 150 victims.This worm phishing campaign is a game-changer in password theft, account takeovers
The security incident highlights the need for multi-factor authentication in the enterprise.APT‑C‑23 group evolves its Android spyware
ESET researchers uncover a new version of Android spyware used by the APT-C-23 threat group against targets in the Middle East
The post APT‑C‑23 group evolves its Android spyware appeared first on WeLiveSecurity