March 17, 2021
Via: Panda SecurityAbout a month ago, multiple media outlets reported that hackers were very close to poisoning a water source located in Florida. The cybercriminals successfully made their way into the computer system controlling a water treatment facility located in the Sunshine […]
March 10, 2021
Via: Security WeekReferred to as the Homeland and Cyber Threat Act, or the HACT Act, the legislation is the reintroduced version of a bill initially introduced in August 2019. The bill was reintroduced by Reps. Jack Bergman (MI-01), Colin Allred (TX-32), Brian […]
March 8, 2021
Via: Computer WeeklyThe US may conduct offensive cyber attacks against targets in Russia within weeks in retaliation for the widespread SolarWinds Orion attacks, even as the government’s cyber security teams deal with additional fall-out from last week’s disclosure of four dangerous vulnerabilities […]
Threats & Malware, Virus & Malware
February 24, 2021
Via: The Hacker NewsThe cybersecurity world is constantly evolving to new forms of threats and vulnerabilities. But ransomware proves to be a different animal—most destructive, persistent, notoriously challenging to prevent, and is showing no signs of slowing down. Falling victim to a ransomware […]
Application security, Security
February 3, 2021
Via: Radware BlogAs more organizations place a priority on application development, production and hosting, new vulnerabilities and threats emerge. The need for a faster time to market, improved user experience and better resource utilization can influence what security protocols are implemented before […]
December 14, 2020
Via: Security AffairsDuring routine Dark web monitoring, the experts from Cyble found a post on a Russian-speaking forum offering the details of 1.9 million members of Chinese Communist Party. The huge trove of data, a 293 MB CSV file, was offered for […]
September 18, 2020
Via: Help Net SecuritySitting in the midst of an unstable economy, a continued public health emergency, and facing an uptick in successful cyber attacks, CISOs find themselves needing to enhance their cybersecurity posture while remaining within increasingly scrutinized budgets. Senior leadership recognizes the […]
August 17, 2020
Via: Security AffairsThe Australian government wants to increase the security of critical infrastructure, for this reason, it plans to manage the response of private enterprises to cyber attacks targeting them. According to a Consultation Paper titled “Protecting Critical Infrastructure and Systems of […]
Security, Threats & Malware, Vulnerabilities
August 7, 2020
Via: TrendMicro BlogWelcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. Based on research that Trend Micro released during Black Hat USA this past week, […]
Threats & Malware, Virus & Malware
August 5, 2020
Via: Computer WeeklyA further increase in cyber attacks exploiting the Covid-19 coronavirus pandemic is highly likely in the near future, especially if there is substantial progress towards a vaccine, according to Interpol. The organisation said that should a vaccine become available, it […]
Cyber warfare, Cyber-crime, Malware
July 31, 2020
Via: Security AffairsThe Council of the European Union announced sanctions imposed on a Russia-linked military espionage unit, as well as companies operating for Chinese and North Korean threat actors that launched cyber-attacks against the EU and its member states. This is the […]
July 22, 2020
Via: Computer WeeklyA dramatic and sustained increase in malicious cyber activity looks set to outlast the immediate impact of the Covid-19 coronavirus pandemic, with cyber attacks up by one-third at the end of June compared to March and April 2020, according to […]
July 14, 2020
Via: Security IntelligenceBefore the coronavirus pandemic hit, working from home used to be a novelty for many employees. According to a June 2020 IBM Security and Morning Consult “Work From Home Survey,” 80% of respondents say they worked from home either rarely […]
June 19, 2020
Via: Security AffairsAustralia ‘s prime minister Scott Morrison said that a “state-based actor” is targeting government, public services, and businesses. Warning Australians of “specific risks” and an increased frequency of attacks, The Australian government is working on “specific risks” related to a […]
June 11, 2020
Via: CSO OnlineThe attack surface of large enterprises has grown in recent months driven by the new work conditions imposed by the COVID-19 pandemic. The threat has increased in many areas including servers that are directly accessible from the internet, domain names, […]
May 27, 2020
Via: Computer WeeklyA steady stream of attacks on enterprise clouds during the first couple of months of 2020 has become a flood since the start of the Covid-19 coronavirus pandemic, with external attacks spiking by more than 600% in the space of […]
April 15, 2020
Via: Computer WeeklyIn recent weeks, the majority of businesses have focused on setting up their employees to be able to work from home. In parallel to this, we have seen an increase in companies being targeted with cyber attacks by opportunist criminals […]
March 27, 2020
Via: CSO OnlineSecurity researchers have come across an attack where an USB dongle designed to surreptitiously behave like a keyboard was mailed to a company under the guise of a Best Buy gift card. This technique has been used by security professionals […]
Cyber-crime, Hacker, Malware, Threats & Malware
March 19, 2020
Via: CSO OnlineWhile organizations can take plenty of steps to ensure employees are well-equipped to work remotely in a secure manner, threat actors of all stripes are already taking advantage of the COVID19/coronavirus situation. Never ones to miss an opportunity, attackers are […]
Application security, Security, Threats & Malware, Vulnerabilities
February 19, 2020
Via: CSO OnlineNew data from security and content delivery company Akamai shows that one in every five attempts to gain unauthorized access to user accounts is now done through application programming interfaces (APIs) instead of user-facing login pages. This trend is even […]