Cybersecurity News
Winning the Cyber-Defense Race: Understand the Finish Line

FIN8 Targets US Bank With New ‘Sardonic’ Backdoor

Critical Azure Cosmos DB Bug Allows Full Cloud Account Takeover

Week in security with Tony Anscombe
ESET research discovers SideWalk backdoor – Why data breach costs have never been higher – 620,000 personal pictures stolen from iCloud accounts
The post Week in security with Tony Anscombe appeared first on WeLiveSecurity
Ragnarok Ransomware Gang Bites the Dust, Releases Decryptor

Top Strategies That Define the Success of a Modern Vulnerability Management Program

‘Pay Ransom’ Screen? Too Late, Humpty Dumpty – Podcast

Parents of teens who stole $1 million in Bitcoin sued by alleged victim
Clipboard malware was developed with the sole purpose of stealing cryptocurrency.US charges HeadSpin ex-CEO over fake $1bn valuation scheme
The SEC claims the startup's metrics were inflated.Beyond the pandemic: Why are data breach costs at an all‑time high?
It might be tempting to blame the record-high costs of data breaches on the COVID-19 pandemic alone. But dig deeper and a more nuanced picture emerges.
The post Beyond the pandemic: Why are data breach costs at an all‑time high? appeared first on WeLiveSecurity
Man Sues Parents of Teens Who Hijacked Nearly $1M in Bitcoin

F5 Bug Could Lead to Complete System Takeover

Chinese developers expose data belonging to Android gamers
In the end, Hong Kong CERT was contacted in an attempt to resolve the security issue.Man impersonates Apple support, steals 620,000 photos from iCloud accounts
The man was after sexually explicit photos and videos that he would then share online or store in his own collection
The post Man impersonates Apple support, steals 620,000 photos from iCloud accounts appeared first on WeLiveSecurity
Podcast: Ransomware Up x10: Disrupting Cybercrime Suppy Chains an Opportunity

What is GDPR and why does the UK want to reshape its data laws?

The government says an overhaul will boost growth and increase trade – but it must be careful not to go too far
The government has announced plans to reshape the UK’s data laws such as GDPR requirements in an effort, it claims, to boost growth and increase trade post-Brexit. The digital, media and culture secretary, Oliver Dowden, says the UK wants to shape data laws based on “common sense, not box-ticking”.
Continue reading...Microsoft Breaks Silence on Barrage of ProxyShell Attacks

UK to overhaul privacy rules in post-Brexit departure from GDPR

Culture secretary says move could lead to an end to irritating cookie popups and consent requests online
Britain will attempt to move away from European data protection regulations as it overhauls its privacy rules after Brexit, the government has announced.
The freedom to chart its own course could lead to an end to irritating cookie popups and consent requests online, said the culture secretary, Oliver Dowden, as he called for rules based on “common sense, not box-ticking”.
Continue reading...Cisco Issues Critical Fixes for High-End Nexus Gear
