What COVID-19 Teaches Us About Social EngineeringUnless we do something proactively, social engineering's impact is expected to keep getting worse as people's reliance on technology increases and as more of us are forced to work from home.
Hackers breached A1 Telekom, Austria's largest ISPA1 needed more than six months to kick the hackers off its network. Whsitleblower claims the intruders were Chinese hackers.
Gamaredon group grows its game
Active APT group adds cunning remote template injectors for Word and Excel documents; unique Outlook mass-mailing macro
The post Gamaredon group grows its game appeared first on WeLiveSecurity
Microsoft discovers cryptomining gang hijacking ML-focused Kubernetes clustersAttacks targeted Kubeflow servers that left their administration panel exposed on the internet.
Congress asks Juniper for the results of its 2015 NSA backdoor investigationThirteen US government officials ask Juniper to publish the findings of its 2015 investigation.
Senators ask Juniper for the results of its 2015 NSA backdoor investigationThirteen US senators ask Juniper to publish the findings of its 2015 investigation.
When Your Biggest Security and Privacy Threats Come From the Ones You LoveResearch examines the risks and design challenges of accounting for privacy threats in intimate relationships.
Misconfigured Databases Targeted Hours After DeploymentResearchers left a poorly configured database open on the Internet to learn who would connect to it and what they would steal.
Rate of Ransomware Attacks in Healthcare Slows in H1 2020But lull is unlikely to continue for long, some security experts say.
Employees Stream Entertainment on Enterprise Systems During PandemicEmployees aren't limiting use of their work computers to business purposes while working from home.
Helping Remote Workers Overcome Remote AttacksBecause remote workers' devices are all connected to a home network, they don’t even need to be attacked directly. Instead, attackers have multiple avenues of attack that can be exploited.
Snake Ransomware Delivers Double-Strike on Honda, Energy Co.The ICS/SCADA-focused malware is likely behind a duo of attacks this week, on Honda and a South American energy company, researchers said.
Vast hack‑for‑hire scheme targeted thousands of people, organizations
An obscure Indian company operated a scheme targeting banks, non-profits, politicians and journalists all over the world, a report says
The post Vast hack‑for‑hire scheme targeted thousands of people, organizations appeared first on WeLiveSecurity
Critical Intel Flaws Fixed in Active Management TechnologyTwo critical flaws in Intel AMT, which could enable privilege escalation, were patched along with 20 other bugs in its June security update.
The Telehealth Attack SurfaceAmid the surge in digital healthcare stemming from the coronavirus pandemic, security is taking a backseat to usability.
What to Know About the Approved Scanning Vendor Program
New vulnerabilities, security holes and bugs are being discovered daily. It is vital to have Internet-facing systems scanned regularly for vulnerabilities to help identify new threats so they can be addressed as soon as possible. Gill Woodcock, VP Global Head of Programs, answers common questions about the Approved Scanning Vendor program.
Fake COVID-19 Contact-Tracing Apps Infect Android PhonesResearchers find 12 Android applications disguised as official COVID-19 contact tracing apps installing malware onto devices.
Slovak police seize wiretapping devices connected to government networkSlovak police also arrest four people, including the head of the government agency responsible for managing the government network.
Asset Management Mess? How to Get OrganizedHardware and software deployments all over the place due to the pandemic scramble? Here are the essential steps to ensure you can find what you need -- and secure it.
Microsoft ships hefty patch load this month
The latest Patch Tuesday knocks out a record-high number of vulnerabilities, including new bugs in the SMB protocol
The post Microsoft ships hefty patch load this month appeared first on WeLiveSecurity