Telephony fraud is a significant challenge. Companies of all sizes and industries are subjected to the malicious usage of voice and SMS with the intent of committing financial fraud, identity theft, denial-of-service, and a variety of other attacks. Businesses that…
A Catastrophic Mutating Event Will Strike the World in 2 Years, Claims WEF
The World Economic Forum (WEF) in Devos, Switzerland has come up with its set of uplifting predictions for 2023. The latest report warns of a global catastrophic cyber event in the near future. The WEF Annual Meeting includes government leaders,…
Bitwarden Password Manager users are being targeted by phishing ads on Google
Scammers are targeting users of cloud-based password managers, including Bitwarden, with phishing attacks. And the mode of attack was malicious ads. Users have reported that they have seen fake advertisements for Bitwarden […] Thank you for being a Ghacks reader.…
Top 5 stories of the week: Ransomware takes a hit, Intel struggles, CIOs get their own special issue, and more
January is nearly over — time is flying by! And things aren’t slowing down in the tech world, either. Here’s the top 5 stories this week. This article has been indexed from Security News | VentureBeat Read the original article: Top 5…
A Link to News Site Meduza Can (Technically) Land You in Russian Prison
Plus: Hive ransomware gang gets knocked offline, FBI confirms North Korea stole $100 million, and more. This article has been indexed from Security Latest Read the original article: A Link to News Site Meduza Can (Technically) Land You in Russian…
ISC fixed high-severity flaws in DNS software suite BIND
The latest BIND updates patch multiple remotely exploitable vulnerabilities that could lead to denial-of-service (DoS). BIND is a suite of software for interacting with the Domain Name System (DNS) maintained by the Internet Systems Consortium (ISC). The ISC released security patches to…
Recent legal developments bode well for security researchers, but challenges remain
Despite the hoodie-wearing bad guy image, most hackers are bona fide security researchers protecting users by probing and testing the security configurations of digital networks and assets. Yet the law has often failed to distinguish between malicious hackers and good-faith…
9 API security tools on the frontlines of cybersecurity
Application programming interfaces (APIs) have become a critical part of networking, programs, applications, devices, and nearly everything else in the computing landscape. This is especially true for cloud and mobile computing, neither of which could probably exist in its current…
Eliminating SaaS Shadow IT is Now Available via a Self-Service Product, Free of Charge
The use of software as a service (SaaS) is experiencing rapid growth and shows no signs of slowing down. Its decentralized and easy-to-use nature is beneficial for increasing employee productivity, but it also poses many security and IT challenges. Keeping…
Microsoft Urges Customers to Secure On-Premises Exchange Servers
Microsoft is urging customers to keep their Exchange servers updated as well as take steps to bolster the environment, such as enabling Windows Extended Protection and configuring certificate-based signing of PowerShell serialization payloads. “Attackers looking to exploit unpatched Exchange servers are not going to…
North Korean Hackers Target Crypto Users with Phony Job Offers
In an effort to commit cryptocurrency heists, North Korean hackers are exhibiting a “startup mentality,” according to a report released on Wednesday by cybersecurity company Proofpoint. The Sunnyvale, California-based company claimed that in December, a group they call TA444,…
Mon Dieu! Suspected French ShinyHunters gang member in the dock
Man seized in Morocco is now presumably sleepless in Seattle A French citizen was scheduled to appear before a US court on Friday on a nine-count indictment related to his alleged involvement in the ShinyHunters cybercrime gang that trafficked in…
Build or Buy your own antivirus product
ISC Releases Security Patches for New BIND DNS Software Vulnerabilities
The Internet Systems Consortium (ISC) has released patches to address multiple security vulnerabilities in the Berkeley Internet Name Domain (BIND) 9 Domain Name System (DNS) software suite that could lead to a denial-of-service (DoS) condition. “A remote attacker could exploit…
Enterprises Don’t Know What to Buy for Responsible AI
Organizations are struggling to procure appropriate technical tools to address responsible AI, such as consistent bias detection in AI applications. This article has been indexed from Dark Reading Read the original article: Enterprises Don’t Know What to Buy for Responsible…
Weekly Update 332
Presently sponsored by: CrowdSec – Gain crowd-sourced protection against malicious IPs and benefit from the most accurate CTI in the world. Get started for free. Breaches all over the place today! Well, this past week, and there's some debate as…
Enterprises Need to Do More to Assure Consumers About Privacy
Organizations care about data privacy, but their priorities appear to be different from what their customers think are important. This article has been indexed from Dark Reading Read the original article: Enterprises Need to Do More to Assure Consumers About…
Ukraine Hit with New Golang-based ‘SwiftSlicer’ Wiper Malware in Latest Cyber Attack
Ukraine has come under a fresh cyber onslaught from Russia that involved the deployment of a previously undocumented Golang-based data wiper dubbed SwiftSlicer. ESET attributed the attack to Sandworm, a nation-state group linked to Military Unit 74455 of the Main Intelligence…
BrandPost: 3 Best Practices for Building Security Resilience
Only 37% of organizations responding to a recent Cisco survey said they’re confident they can remain resilient in the event of a worst-case security incident. That’s not surprising, given the rapidly increasing volume of endpoints distributed across complex IT architectures.…
The CSO guide to top security conferences
There is nothing like attending a face-to-face event for career networking and knowledge gathering, and we don’t have to tell you how helpful it can be to get a hands-on demo of a new tool or to have your questions…
FBI takes down Hive ransomware group in an undercover operation
The US Department of Justice (DOJ) along with international partners has taken down the Hive ransomware group. The operation that began in July 2022 resulted in the FBI penetrating Hive’s computer networks, capturing its decryption keys, and offering them to…
Hackers abuse legitimate remote monitoring and management tools in attacks
Security researchers warn that an increasing number of attackers are using legitimate remote monitoring and management (RMM) tools in their attacks to achieve remote access and control over systems. These tools are commonly used by managed service providers (MSPs) and…
BrandPost: Understanding Device and Infrastructure Attacks: Exploring the Microsoft Digital Defense Report 2022
The Microsoft Digital Defense Report explores the most pressing cyber threats as they relate to cybercrime, nation-state threats, devices and infrastructure, cyber-influence operations, and cyber resiliency. Based on intelligence from 43 trillion security signals daily, this report offers insight and…
FBI Hacks Back Hive Ransomware Gang’s Infrastructure – Website Seized
As a result of an international law enforcement operation, the sites utilized by the Hive ransomware operation for both payments and data leaks on the Tor network were successfully taken over, following the FBI’s infiltration of the group’s infrastructure in…
IronNet Announces Receipt of Continued Listing Standard Notice from NYSE
MCLEAN, Va.–(BUSINESS WIRE)–IronNet, Inc. (NYSE: IRNT) announced today that it received written notice on January 24, 2023 from the New York Stock Exchange (NYSE) that the Company is not in compliance with the NYSE continued listing standards, which require it…
Cyberattacks Cost Small Businesses, While Prevention Attracts Customers
MATTOON, Ill.–(BUSINESS WIRE)–Consolidated Communications (NASDAQ: CNSL), a leading broadband and business communications provider, is sharing resources and tips for small businesses to enhance data privacy, as small businesses are proven to be especially vulnerable to costly data breaches. The Small…
IT/OT convergence and Cybersecurity best practices
The content of this post is solely the responsibility of the author. AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article. Most of the time, the advantages of technology…