Cybersecurity News
Red Cross Begs Attackers Not to Leak 515K People’s Stolen Data
A cyberattack forced the Red Cross to shut down IT systems running the Restoring Family Links system, which reunites families fractured by war, disaster or migration.20 January 2022
SEC Filing Reveals Fortune 500 Firm Targeted in Ransomware Attack
R.R. Donnelly, the integrated services company, confirmed a ‘systems intrusion’ that occurred in late December and is still under investigation.20 January 2022
How to know if your email has been hacked
Think your email may have been hacked? Here are the signs to look for, how account takeover attacks commonly occur, and how to recover your account and avoid falling victim again
The post How to know if your email has been hacked appeared first on WeLiveSecurity
20 January 2022
Multichain token hack losses reach $3 million: report
Multichain messaging seems confusing, at best.20 January 2022
'Serial' romance fraudster jailed for trying to scam 670 people in the UK
Victims were conned out of thousands of pounds, including one woman who was terminally ill.20 January 2022
Destructive Wiper Targeting Ukraine Aimed at Eroding Trust, Experts Say
Disruptive malware attacks on Ukrainian organizations (posing as ransomware attacks) are very likely part of Russia’s wider effort to undermine Ukraine’s sovereignty, according to analysts.19 January 2022
Box 2FA Bypass Opens User Accounts to Attack
A security bug in the file-sharing cloud app could have allowed attackers using stolen credentials to skate by one-time SMS code verification requirements.19 January 2022
IRS Will Soon Require Selfies for Online Access
If you created an online account to manage your tax records with the U.S. Internal Revenue Service (IRS), those login credentials will cease to work later this year. The agency says that by the summer of 2022, the only way to log in to irs.gov will be through ID.me, an online identity verification service that requires applicants to submit copies of bills and identity documents, as well as a live video feed of their faces via a mobile device.19 January 2022
Deloitte launches new SaaS cyber threat detection and response platform
AWS, CrowdStrike, Exabeam, and Google Cloud Chronicle are operationalizing the new platform.19 January 2022
Beijing Olympics App Flaws Allow Man-in-the-Middle Attacks
Attackers can access audio and files uploaded to the MY2022 mobile app required for use by all winter games attendees – including personal health details.19 January 2022
Zoom vulnerabilities impact clients, MMR servers
Vulnerabilities in the videoconferencing software have been analyzed by Google researchers.19 January 2022
Cloned Dept. of Labor Site Hawks Fake Government Contracts
A well-crafted but fake government procurement portal offers the opportunity to submit a bid for lucrative government projects -- but harvests credentials instead.19 January 2022
Donot Team APT will strike gov't, military targets for years - until they succeed
The group has been described as "remarkably persistent" in cyberattacks.19 January 2022
Will 2022 Be the Year of the Software Bill of Materials?
Praise be & pass the recipe for the software soup: There's too much scrambling to untangle vulnerabilities and dependencies, say a security experts roundtable.18 January 2022
The Log4j Vulnerability Puts Pressure on the Security World
It's time to sound the alarm for Log4Shell. Saryu Nayyar, CEO at Gurucul, discusses what actions you should be taking.18 January 2022
Cybercriminals Actively Target VMware vSphere with Cryptominers
VMware's container-based application development environment has become attractive to cyberattackers.18 January 2022
How tech is a weapon in modern domestic abuse -- and how to protect yourself
From Apple AirTags to stalkerware, everyday tech can be used against you.18 January 2022
‘White Rabbit’ Ransomware May Be FIN8 Tool
It's a double-extortion play that uses the command-line password ‘KissMe’ to hide its nasty acts and adorns its ransom note with cutesy ASCII bunny art.18 January 2022
Critical ManageEngine Desktop Server Bug Opens Orgs to Malware
Zoho's comprehensive endpoint-management platform suffers from an authentication-bypass bug (CVE-2021-44757) that could lead to remote code execution.18 January 2022
Organizations Face a ‘Losing Battle’ Against Vulnerabilities
Companies must take more ‘innovative and proactive’ approaches to security in 2022 to combat threats that emerged last year, researchers said.18 January 2022