Cybersecurity News


Bluetooth bugs open the door for attackers to impersonate devices

Devices supporting the Bluetooth Core and Mesh specifications are impacted.
26 May 2021

Russian national jailed for running stolen data, hijacked account seller platform deer.io

Kirill Victorovich Firsov was arrested by the FBI last year.
26 May 2021

CEO Fraud

CEO Fraud / BEC is a type of targeted email attack. It commonly involves a cyber criminal pretending to be your boss or a senior leader and then tricking you into sending the criminal highly sensitive information, buying gift cards or initiating a wire transfer. Be highly suspicious of any emails demanding immediate action and/or asking you to bypass any security procedures.
26 May 2021

Cloud Compromise Costs Organizations $6.2M Per Year

Organizations reported an average of 19 cloud-based compromises in the past year, but most don't evaluate the security of SaaS apps before deployment.
25 May 2021

Russia Profiting from Massive Hydra Cybercrime Marketplace

An analysis of Bitcoin transactions from the Hydra marketplace show that the operators are locking sellers into Russian exchanges, likely fueling profits for local actors.
25 May 2021

Rise in Opportunistic Hacks and Info-Sharing Imperil Industrial Networks

Rise in Opportunistic Hacks and Info-Sharing Imperil Industrial Networks Security researchers at Mandiant have seen an increasing wave of relatively simplistic attacks involving ICS systems - and attackers sharing their finds with one another - since 2020.
25 May 2021

Threat Actor ‘Agrius’ Emerges to Launch Wiper Attacks Against Israeli Targets

Threat Actor ‘Agrius’ Emerges to Launch Wiper Attacks Against Israeli Targets The group is using ransomware intended to make its espionage and destruction efforts appear financially motivated.
25 May 2021

MacOS Zero-Day Let Attackers Bypass Privacy Preferences

Apple has released security patches for vulnerabilities in macOS and tvOS that reports indicate have been exploited in the wild.
25 May 2021

Axis Fosters Work-From-Home Momentum with Zero Trust Network Access

SPONSORED: Watch now -- VPN and VDI, while still useful, lack the hardened security required to keep users secure. That's created an opening for Zero Trust network access.
25 May 2021

Russian Sentenced to 30 Months for Running Criminal Website

FBI says sales from illicit online shop deer.io exceeded $17 million
25 May 2021

Your Network's Smallest Cracks Are Now Its Biggest Threats

Bad actors have flipped the script by concentrating more on low-risk threats. Here's how to address the threat and the tactics.
25 May 2021

Trend Micro Bugs Threaten Home Network Security

Trend Micro Bugs Threaten Home Network Security The security vendor's network management and threat protection station can open the door to code execution, DoS and potential PC takeovers.
25 May 2021

Uptycs Offers Resilience Formula to Boost Business Continuity

SPONSORED CONTENT: Breaches and data loss are inevitable, but customers can bounce back more readily with some planning and foresight, says Ganesh Pai, CEO and founder of Uptycs. He suggests a trajectory for customers looking to improve their own resilience, starting with proactiveness, followed by reactivity, then predictive capabilities and better protection.
25 May 2021

The Makings of a Better Cybersecurity Hire

The Makings of a Better Cybersecurity Hire Experience counts, but as one CISO has learned, don't overlook a creative, motivated candidate just because their background doesn't match the job description.
25 May 2021

Combatting Insider Threats with Keyboard Security

Combatting Insider Threats with Keyboard Security Dale Ludwig, business development manager at Cherry Americas, discusses advances in hardware-based security that can enhance modern cyber-defenses.
25 May 2021

Bose Admits Ransomware Hit: Employee Data Accessed

Bose Admits Ransomware Hit: Employee Data Accessed The consumer-electronics stalwart was able to recover without paying a ransom, it said.
25 May 2021

Pulse Secure VPNs Get Quick Fix for Critical RCE

Pulse Secure VPNs Get Quick Fix for Critical RCE One of the workaround XML files automatically deactivates protection from an earlier workaround: a potential path to older vulnerabilities being opened again.
25 May 2021

Not as complex as we thought: Cyberattacks on operational technology are on the rise

Common techniques are setting a low bar for attacks on control processes. Sometimes, attackers have no idea what the system is used for.
25 May 2021

The Adversary Within: Preventing Disaster From Insider Threats

Insiders are in a position of trust, and their elevated permissions provide opportunities to cause serious harm to critical business applications and processes.
25 May 2021