Cybersecurity News
GoDaddy’s Latest Breach Affects 1.2M Customers

Arrest in ‘Ransom Your Employer’ Email Scheme
In August, KrebsOnSecurity warned that scammers were contacting people and asking them to unleash ransomware inside their employer's network, in exchange for a percentage of any ransom amount paid by the victim company. This week, authorities in Nigeria arrested a suspect in connection with the scheme -- a young man who said he was trying to save up money to help fund a new social network.Online Merchants: Prevent Fraudsters from Becoming Holiday Grinches

Attackers Hijack Email Threads Using ProxyLogon/ProxyShell Flaws

Imunify360 Bug Leaves Linux Web Servers Open to Code Execution, Takeover

Over a million WordPress sites breached
WordPress site owners hosted by GoDaddy woke this morning to find that their sites had been cracked open.What to do if you receive a data breach notice
Receiving a breach notification doesn’t mean you’re doomed – here’s what you should consider doing in the hours and days after learning that your personal data has been exposed
The post What to do if you receive a data breach notice appeared first on WeLiveSecurity
The ‘Zelle Fraud’ Scam: How it Works, How to Fight Back
One of the more common ways cybercriminals cash out access to bank accounts involves draining the victim's funds via Zelle, a "peer-to-peer" (P2P) payment service used by many financial institutions that allows customers to quickly send cash to friends and family. Naturally, a great deal of phishing schemes that precede these bank account takeovers begin with a spoofed text message from the target's bank warning about a suspicious Zelle transfer. What follows is a deep dive into how this increasingly clever Zelle fraud scam typically works, and what victims can do about it.Iranians Charged in Cyberattacks Against U.S. 2020 Election

6M Sky Routers Left Exposed to Attack for Nearly 1.5 Years

Week in security with Tony Anscombe
ESET discovers watering hole attacks in the Middle East – Getting your life back on track after identity theft – How foreign influence operations have evolved
The post Week in security with Tony Anscombe appeared first on WeLiveSecurity
CYBERWARCON – Foreign influence operations grow up
Not long ago, disinformation campaigns were rather unsophisticated. These days, however, threat actors put serious time and effort into crafting their attacks.
The post CYBERWARCON – Foreign influence operations grow up appeared first on WeLiveSecurity
California Pizza Kitchen Serves Up Employee SSNs in Data Breach

Ransomware Phishing Emails Sneak Through SEGs

3 Top Tools for Defending Against Phishing Attacks

FBI: FatPipe VPN Zero-Day Exploited by APT for 6 Months

US Government declassifies data to foster would‑be defenders
US Government declassifies cybersecurity subjects they want you to learn about, and is hoping to pay you to learn them
The post US Government declassifies data to foster would‑be defenders appeared first on WeLiveSecurity
Spear-Phishing Campaign Exploits Glitch Platform to Steal Credentials

How to Choose the Right DDoS Protection Solution
