Cybersecurity News


Ransomware Going for $4K on the Cyber-Underground

Ransomware Going for $4K on the Cyber-Underground An analysis of three popular forums used by ransomware operators reveals a complex ecosystem with many partnerships.
13 May 2021

Dragos & IronNet Partner on Critical Infrastructure Security

The IT and OT security providers will integrate solutions aimed at improving critical infrastructure security
13 May 2021

HelpSystems expands email, cloud security portfolio with acquisition of Agari, Beyond Security

The vendor is targeting areas ripe for growth in the cybersecurity field.
13 May 2021

When AI Becomes the Hacker

When AI Becomes the Hacker Bruce Schneier explores the potential dangers of artificial intelligence (AI) systems gone rogue in society.
13 May 2021

Microsoft Adds GPS Location to Identity & Access Control in Azure AD

New capabilities let admins restrict access to resources from privileged access workstations or regions based on GPS location.
13 May 2021

Adapting to the Security Threat of Climate Change

Business continuity plans that address natural and manmade disasters can help turn a cataclysmic business event into a minor slowdown.
13 May 2021

European police bust major online investment fraud ring

The operation was carried out against an organized group that used online trading platforms to swindle victims out of US$36 million

The post European police bust major online investment fraud ring appeared first on WeLiveSecurity

13 May 2021

Beyond MFA: Rethinking the Authentication Key

Beyond MFA: Rethinking the Authentication Key Tony Lauro, director of security technology and strategy at Akamai, discusses hardware security dongles and using phones to act as surrogates for them.
13 May 2021

Fresh Loader Targets Aviation Victims with Spy RATs

Fresh Loader Targets Aviation Victims with Spy RATs The campaign is harvesting screenshots, keystrokes, credentials, webcam feeds, browser and clipboard data and more, with RevengeRAT or AsyncRAT payloads.
13 May 2021

Colonial Pipeline paid close to $5 million in ransomware blackmail payment

The payment was reportedly made soon after the attack began. It wasn’t enough to stop the disruption.
13 May 2021

Defending the Castle: How World History Can Teach Cybersecurity a Lesson

Defending the Castle: How World History Can Teach Cybersecurity a Lesson Cybersecurity attackers follow the same principles practiced in warfare for millennia. They show up in unexpected places, seeking out portions of an organization's attack surface that are largely unmonitored and undefended.
13 May 2021

Apple’s ‘Find My’ Network Exploited via Bluetooth

Apple’s ‘Find My’ Network Exploited via Bluetooth The ‘Send My’ exploit can use Apple's locator service to collect and send information from nearby devices for later upload to iCloud servers.
13 May 2021

Five Critical Password Security Rules Your Employees Are Ignoring

Five Critical Password Security Rules Your Employees Are Ignoring According to Keeper Security’s Workplace Password Malpractice Report, many remote workers aren’t following best practices for password security.
13 May 2021

Verizon DBIR 2021: "Winners" No Surprise, But All-round Vigilance Essential

Verizon's Data Breach Investigations Report (DBIR) covers 2020 -- a year like no other. Phishing, ransomware, and innovation caused big problems.
13 May 2021

Pipeline Update: Biden Executive Order, DarkSide Detailed and Gas Bags

Pipeline Update: Biden Executive Order, DarkSide Detailed and Gas Bags FBI/CISA warn about the RaaS network behind the Colonial hack, Colonial restarts operations, and researchers details groups that rent the ransomware.
13 May 2021

Fake Android, iOS apps promise lucrative investments while stealing your money

Hundreds of malicious cryptocurrency, stock, and banking apps have been discovered by researchers.
13 May 2021

Identity Theft

Identity theft is when someone steals information about you and then uses that information to pretend to be you and commit crimes, such as credit card fraud. One of the key steps to protecting yourself is monitoring your financial, credit score and credit card accounts. The sooner you detect fraud in any of these accounts, the sooner you can minimize the damage.
13 May 2021

Despite Heightened Breach Fears, Incident Response Capabilities Lag

Many organizations remain unprepared to detect, respond, and contain a breach, a new survey shows.
12 May 2021

Researchers Unearth 167 Fake iOS & Android Trading Apps

The apps are disguised as financial trading, banking, and cryptocurrency apps from well-known and trusted organizations.
12 May 2021

Putting The Spotlight on DarkSide

Incident responders share insight on the DarkSide ransomware group connected to the recent Colonial Pipeline ransomware attack.
12 May 2021