Cybersecurity News
When the alarms go off: 10 key steps to take after a data breach
It’s often said that data breaches are no longer a matter of ‘if’, but ‘when’ – here’s what your organization should do, and avoid doing, in the case of a security breach
The post When the alarms go off: 10 key steps to take after a data breach appeared first on WeLiveSecurity
EU pharmaceutical giants run old, vulnerable apps and fail to use encryption in login forms
New research highlights hundreds of companies that are at risk of cyberattacks.North Korean hackers target the South's think tanks through blog posts
Responsibility for new attacks has been laid at the feet of the Kimsuky threat group.SMS About Bank Fraud as a Pretext for Voice Phishing
Most of us have probably heard the term "smishing" -- which is a portmanteau for traditional phishing scams sent through SMS text messages. Smishing messages usually include a link to a site that spoofs a popular bank and tries to siphon personal information. But increasingly, phishers are turning to a hybrid form of smishing -- blasting out linkless text messages about suspicious bank transfers as a pretext for immediately calling and scamming anyone who responds via text.Critical Citrix DDoS Bug Shuts Down Network, Cloud App Access
The distributed computing vendor patched the flaw, affecting Citrix ADC and Gateway, along with another flaw impacting availability for SD-WAN appliances.Google scores big win as court blocks iPhone tracking lawsuit
The tech giant wins an appeal against a claim that it unlawfully collected personal data of millions of iPhone users
The post Google scores big win as court blocks iPhone tracking lawsuit appeared first on WeLiveSecurity
Massive Zero Day Hole Found in Palo Alto Security Appliances
Researchers have a working exploit for the vulnerability (now patched), which allows for unauthenticated RCE and affects an estimated 70,000+ VPN/firewalls.New Android Spyware Poses Pegasus-Like Threat
PhoneSpy already has stolen data and tracked the activity of targets in South Korea, disguising itself as legitimate lifestyle apps.A stalker's wishlist: PhoneSpy malware destroys Android privacy
A new surveillance campaign has revealed widespread infection on Android devices.Microsoft Nov. Patch Tuesday Fixes Six Zero-Days, 55 Bugs
Experts urged users to prioritize patches for Microsoft Exchange and Excel, those favorite platforms so frequently targeted by cybercriminals and nation-state actors.Microsoft Patch Tuesday, November 2021 Edition
Microsoft Corp. today released updates to quash at least 55 security bugs in its Windows operating systems and other software. Two of the patches address vulnerabilities that are already being used in active attacks online, and four of the flaws were disclosed publicly before today -- potentially giving adversaries a head start in figuring out how to exploit them.Not Punny: Angling Direct Breach Cripples Retailer for Days
A U.K. fishing retailer’s site has been hijacked and redirected to Pornhub.Robinhood data breach affects 7 million people
An attacker gained access to some of Robinhood's customer support systems and stole the personal data of around a third of the app's userbase
The post Robinhood data breach affects 7 million people appeared first on WeLiveSecurity
Robinhood data breach affects 7 million people
An attacker gained access to some of Robinhood's customer support systems and stole the personal data of around a third of the app's userbase
The post Robinhood data breach affects 7 million people appeared first on WeLiveSecurity
Paving the Way: Inspiring Women in Payments - A Q&A Featuring Amandeep Kaur
Amandeep Kaur was given a life-changing opportunity to leave her small village and move to the United Kingdom to stay with her aunt and uncle and study Information Security and Computer Forensics at a university of her choice. She followed her passion and, as a result, was able to start a new career in cybersecurity. But, for many women, opportunities like these are hard to find. In this edition of our blog, Amandeep explains that a lack of female role models in the industry, as well as a false stereotype that technology is “too hard” for women, can create negative perceptions that discourage women from this type of career.