July 29, 2021
Via: ArsTechnicaGovernment officials in the US, UK, and Australia are urging public- and private-sector organizations to secure their networks by ensuring firewalls, VPNs, and other network-perimeter devices are patched against the most widespread exploits. In a joint advisory published Wednesday, the […]
April 30, 2021
Via: Threat PostSecurity researchers at Microsoft are warning the industry about 25 as-yet undocumented critical memory-allocation vulnerabilities across a number of vendors’ IoT and industrial devices that threat actors could exploit to execute malicious code across a network or cause an entire […]
April 14, 2021
Via: BGRA little more than a month after Microsoft disclosed a bombshell piece of cybersecurity industry news — an attack on Microsoft Exchange servers, whereby state-sponsored hackers from China were chaining together attacks on four vulnerabilities in Microsoft’s email cloud service […]
February 3, 2021
Via: Threat PostGoogle patched five critical bugs in its Android operating system as part of its February Security Bulletin. Two of the flaws were remote code execution vulnerabilities found within the Android media framework and system. Three additional critical Qualcomm bugs were […]
January 26, 2021
Via: Threat PostHackers linked to North Korea are targeting security researchers with an elaborate social-engineering campaign that sets up trusted relationships with them — and then infects their organizations’ systems with custom backdoor malware. That’s according to Google’s Threat Analysis Group (TAG), […]
January 15, 2021
Via: ZDnetAlmost half of all data breaches in hospitals and the wider healthcare sector are as a result of ransomware attacks according to new research. Ransomware gangs are increasingly adding an extra layer of extortion to attacks by not only encrypting […]
December 28, 2020
Via: ArsTechnica2020 was a tough year for a lot of reasons, not least of which were breaches and hacks that visited pain on end users, customers, and the organizations that were targeted. The ransomware menace dominated headlines, with an endless stream […]
December 4, 2020
Via: ArsTechnicaAndroid apps with hundreds of millions of downloads are vulnerable to attacks that allow malicious apps to steal contacts, login credentials, private messages, and other sensitive information. Security firm Check Point said that the Edge Browser, the XRecorder video and […]
November 20, 2020
Via: ZDnetCyber criminals could exploit emerging technologies including artificial intelligence and machine learning to help conduct attacks against autonomous cars, drones and Internet of Things-connected vehicles, according to a report from the United Nations, Europol and cybersecurity company Trend Micro. While […]
October 28, 2020
Via: Threat PostThe line between our personal and professional lives is blurring in an unprecedented fashion as we approach the 2020 presidential election. From Oracle and Walmart’s plans to invest in TikTok to a bug in Joe Biden’s campaign app that exposed […]
October 19, 2020
Via: CSO OnlineAmong the many technology impacts of the coronavirus pandemic is a rise in the use of QR codes. Naturally, bad actors are taking advantage of this opportunity and the vulnerabilities of this mobile technology to launch attacks. Security teams need […]
October 15, 2020
Via: ArsTechnicaGoogle and Intel are warning of a high-severity Bluetooth flaw in all but the most recent version of the Linux Kernel. While a Google researcher said the bug allows seamless code execution by attackers within Bluetooth range, Intel is characterizing […]
August 25, 2020
Via: Threat PostWith the 2020 U.S. Presidential Election coming up in just two months and change, cybersecurity concerns have come to the fore for average citizens and politicians alike. That said, the likelihood of election results being impacted by an attack is […]
August 10, 2020
Via: CSO OnlineAll organizations wrestle with chronic phishing attacks that are the primary vectors through which malicious actors breach systems and spread malware. Most phishing attackers deliver their payloads on networks by crafting spoofed emails that look like they come from legitimate, […]
June 30, 2020
Via: ArsTechnicaForeign hackers backed by a well-resourced government are likely to exploit a critical vulnerability in a host and VPN and firewall products sold by Palo Alto Networks, officials in the US federal government warned on Tuesday. In worst-case scenarios, the […]
May 4, 2020
Via: CSO OnlineAttackers are exploiting two critical vulnerabilities disclosed late last week in the popular SaltStack infrastructure automation software to take control of servers. Several organizations and open-source projects already had their servers hacked and had to shut down services over the […]
April 14, 2020
Via: Threat PostRecent malware campaigns reveal that cybercriminals aren’t sparing healthcare firms, medical suppliers and hospitals on the frontlines of the coronavirus pandemic. Researchers have shed light on two recently uncovered malware campaigns: one targeting a Canadian government healthcare organization and a […]
February 19, 2020
Via: ArsTechnicaWhen your family opened up that brand-new computer when you were a kid, you didn’t think of all of the third-party work that made typing in that first BASIC program possible. There once was a time when we didn’t have […]
October 28, 2019
Via: ZDnetYes, this is one of those end-of-year summaries. And it’s a long one, since 2019 has been a disaster in terms of cyber-security news, with one or more major stories breaking on a weekly basis. Below is a summary for […]
August 27, 2019
Via: ArsTechnicaThe iOS vulnerability that made it possible for users and hackers to jailbreak fully up-to-date iPhones and iPads is no more, following an update Apple released on Monday that patches the highly unusual bug. The security advisory accompanying the release […]