Visa fraud expert outlines the many faces of payment ecosystem fraud

Pakistan-Origin SideCopy Linked to New Cyberattack on India’s Ministry of Defence

Apple Issues Urgent Security Update for Older iOS and iPadOS Models

CISA to Start Issuing Early-Stage Ransomware Alerts

Microsoft Warns of Stealthy Outlook Vulnerability Exploited by Russian Hackers

CISA releases free tool for detecting malicious activity in Microsoft cloud environments

Top ways attackers are targeting your endpoints

2023 Cybersecurity Maturity Report Reveals Organizational Unpreparedness for Cyberattacks

J.P. Morgan Payments: AI Transforms Payments’ Tony Starks into Data-Driven Iron Men

New DotRunpeX Malware Delivers Multiple Malware Families via Malicious Ads

Google Cloud’s US-East load balancers are lousy with latency

A New Security Category Addresses Web-borne Threats

SVB account holders targeted with phishing, scams

How ChatGPT is changing the cybersecurity game

Most security pros turn to unauthorized AI tools at work

APT Actors Exploited Telerik Vulnerability in Govt IIS Server – CISA

How two-step phishing attacks evade detection and what you can do about it

So, you want to deploy air-gapped Kubernetes, huh?

Microsoft Rolls Out Patches for 80 New Security Flaws — Two Under Active Attack

Ransomware Attacks Have Entered a Heinous New Phase

What You Need to Know to Create a Winning Hybrid Workplace

The Prolificacy of LockBit Ransomware

How to Apply NIST Principles to SaaS in 2023

Understanding password behavior key to developing stronger cybersecurity protocols

BATLOADER Malware Uses Google Ads to Deliver Vidar Stealer and Ursnif Payloads

China-linked Hackers Targeting Unpatched SonicWall SMA Devices with Malware

When Partial Protection is Zero Protection: The MFA Blind Spots No One Talks About

Does Your Help Desk Know Who’s Calling?

Iranian Hackers Target Women Involved in Human Rights and Middle East Politics

Massive GitHub analysis reveals 10 million secrets hidden in 1 billion commits

Inadequate patches and advisories increase cyber risk

Jenkins Security Alert: New Security Flaws Could Allow Code Execution Attacks

Python Developers Warned of Trojanized PyPI Packages Mimicking Popular Libraries

Attackers Flood NPM Repository with Over 15,000 Spam Packages Containing Phishing Links

The Future of Network Security: Predictive Analytics and ML-Driven Solutions

GoDaddy Says Third Cyberattack by Group Targeted Customer Sites

PayPal Scammers Using Legitimate Accounts to Send Phishing Invoices

Why the C-Suite Doesn’t Need Access to All Corporate Data

Data Breach at Panasonic

Investor Group to Acquire McAfee for $14B

Microsoft will now snitch on you at work like never before

Hardcoded SSH Key in Cisco Policy Suite Lets Remote Hackers Gain Root Access

Critical RCE Vulnerability Reported in Linux Kernel’s TIPC Module

How Psychology Can Save Your Cybersecurity Awareness Training Program

Bug in Popular WinRAR Software Could Let Attackers Hack Your Computer

Candy Corn Maker Hit With Ransomware

NSA, FBI, CISA Issue Advisory on ‘BlackMatter’ Ransomware

Google adds VM support to Anthos, admits not everyone is ready for containerised everything

5-Year Breach May Have Exposed Billions of Text Messages

A New APT Hacking Group Targeting Fuel, Energy, and Aviation Industries

50% of Servers Have Weak Security Long After Patches Are Released

New FinSpy Malware Variant Infects Windows Systems With UEFI Bootkit

Microsoft warns: Active Directory FoggyWeb malware being actively used by Nobelium gang

SonicWall Issues Patches for a New Critical Flaw in SMA 100 Series Devices

Microsoft Warns of a Wide-Scale Phishing-as-a-Service Operation

Enterprises Need 27 New IT Hires to Manage Security Debt

77% of execs concerned about security tools gaps in their company

Networking issues enterprises must address to improve business and operational efficiency

Network security market growth driven by remote work popularity and security needs

Attacks on IoT Devices Double Over Past Year

Chinese Developer Exposes Data on Over One Million Gamers

Revere Health Data Breach Impacts Cardiology Patients

Robots don’t smoke, says Alibaba, and that’s why they deliver parcels so fast

China’s digital yuan is a warning to the world

Misconfigured Server Leaks US Terror Watchlist

Cybercrime Costs Victims $318 bn Annually

Data Breach at Georgia Health System

UPMC to Pay $2.65M to Settle Data Breach Case

May 2021 saw a 440% increase in phishing, the single largest phishing spike on record

The destructive power of supply chain attacks and how to secure your code

Multiple Zero-Day Flaws Discovered in Popular Hospital Pneumatic Tube System

New APT Hacking Group Targets Microsoft IIS Servers with ASP.NET Exploits

Law Firm for Ford, Pfizer, Exxon Discloses Ransomware Attack

NSO Group Spyware Used On Journalists & Activists Worldwide

Researcher Uncover Yet Another Unpatched Windows Printer Spooler Vulnerability

Attackers Exploited 4 Zero-Day Flaws in Chrome, Safari & IE

Update Your Windows PCs to Patch 117 New Flaws, Including 9 Zero-Days

Microsoft Patches 3 Windows Zero-Days Amid 117 CVEs

Can Government Effectively Help Businesses Fight Cybercrime?

Critical Flaws Reported in Philips Vue PACS Medical Imaging Systems

Autonomous Security Is Essential if the Edge Is to Scale Properly

Ransomware Losses Drive Up Cyber-Insurance Costs

New House Bill Aims to Drive Americans’ Security Awareness

Tufin Rule Lifecycle Management App simplifies and manages the rule certification process

74% of Q1 Malware Was Undetectable Via Signature-Based Tools

How to convince your boss that cybersecurity includes Active Directory

New DNS Name Server Hijack Attack Exposes Businesses, Government Agencies

Data Leaked in Fertility Clinic Ransomware Attack

Beware! Connecting to This Wireless Network Can Break Your iPhone’s Wi-Fi Feature

Week in review: VPN attacks up nearly 2000%, Root of Trust for the cloud era

A New Spyware is Targeting Telegram and Psiphon VPN Users in Iran

Security Flaw Discovered In Peloton Equipment

IoT Supply Chain Bug Hits Millions of Cameras

Ransomware Attackers Partnering With Cybercrime Groups to Hack High-Profile Targets

Thousands of VMware vCenter Servers Remain Open to Attack Over the Internet

Chinese Hackers Believed to be Behind Second Cyberattack on Air India

Avaddon ransomware group closes shop, sends all 2,934 decryption keys to BleepingComputer

US to Treat Ransomware Like Terrorism

Higher encryption adoption driven by rising data breach threats

The Colonial Pipeline Attack Is Your Boardroom Wake-Up Call

Scripps Notifying 147K People of Data Breach

A New Bug in Siemens PLCs Could Let Hackers Run Malicious Code Remotely

FBI issues warning about Fortinet vulnerabilities after APT group hacks local gov’t office

Russian Hydra DarkNet Market Made Over $1.3 Billion in 2020

Critical RCE Vulnerability Found in VMware vCenter Server — Patch Now!

Cyber Insurance Firms Start Tapping Out as Ransomware Continues to Rise

Details Disclosed On Critical Flaws Affecting Nagios IT Monitoring Software

Air India admits to data breach impacting 4.5m customers, sat on the news for five weeks

Watch out as fake ransomware attack infects PCs with StrRAT

HMRC Investing Heavily in Cybersecurity Training for Staff, Official Figures Show

3.4 billion credential stuffing attacks hit financial services organizations

The zero trust security market continues to grow

47% of Criminals Buying Exploits Target Microsoft Products

Rapid7 Is the Latest Victim of a Software Supply Chain Breach

Two-thirds of CISOs Unprepared for Cyber-attack

85% of breaches involve the human element

‘Significant’ ransomware attack forces Ireland’s health service to shut down IT systems

Firms Struggle to Secure Multicloud Misconfigurations

Why You Should Be Prepared to Pay a Ransom

90% of security leaders view bot management as a top priority

CrowdStrike and Google Cloud deliver defense-in-depth security across hybrid cloud environments

XM Cyber partners with Spire Solutions to offer its solutions in the Middle Eastern market

Would you install iPhone apps from a third-party iOS store?

Critical Flaws Hit Cisco SD-WAN vManage and HyperFlex Software

Hundreds of Millions of Dell Computers Potentially Vulnerable to Attack

Stopping the Next SolarWinds Requires Doing Something Different

Ransomware Task Force Publishes Framework to Fight Global Threat

Researchers Uncover Stealthy Linux Malware That Went Undetected for 3 Years

China’s highest-ranked university creates school dedicated to integrated circuits

Over 750,000 Users Downloaded New Billing Fraud Apps From Google Play Store

CISO’s guide to automating third-party cyber risk management

Bad bot traffic reaching an all-time high over the past year

Protecting the human attack surface from the next ransomware attack

Dell Technologies to spin VMware into independent company

Update Your Chrome Browser to Patch 2 New In-the-Wild 0-Day Exploits

Cyber-bullied Teen Takes Own Life

Microsoft Warns of Malware Delivery via Google URLs

These are the terrible passwords that people are still using. Here’s how to do better

These are the terrible passwords that people are still using. Here’s how to do better

Hackers From China Target Vietnamese Military and Government

Easily distracted by too many apps, too many meetings, and too much asparagus

Hacked companies had backup plans. But they didn’t print them out before the attack.

Hackers Set Up a Fake Cybersecurity Firm to Target Security Experts

Cloud technology adoption gap between internal audit and other enterprise functions to narrow

Hackers are implanting multiple backdoors at industrial targets in Japan

Billions of records have been hacked already. Make cybersecurity a priority or risk disaster, warns analyst

The importance of a zero trust-based approach to identity security

Apple Issues Urgent Patch Update for Another Zero‑Day Under Attack

SMBs: How do you build the perfect tech stack?

Another Critical RCE Flaw Discovered in SolarWinds Orion Platform

Purple Fox Rootkit Can Now Spread Itself to Other Windows Computers

WARNING: A New Android Zero-Day Vulnerability Is Under Active Attack

Hyundai and Singtel team up to monitor electric vehicle batteries in Singapore

Coffee bot: OrionStar’s 5G robots target service, convenience

The future of IT security: All roads lead to the cloud

If you are not finding vulnerabilities, then you are not looking hard enough

Password reuse defeats the purpose of passwords

Google emits data-leaking proof-of-concept Spectre exploit for Intel CPUs to really get everyone’s attention

Contemplating the Coffee Supply Chain: A Horror Story

Microsoft Exchange Server hacks ‘doubling’ every two hours

New Browser Attack Allows Tracking Users Online With JavaScript Disabled

Compromised devices and data protection: Be prepared or else

Fixing the Weakest Link — The Passwords — in Cybersecurity Today

Critical Pre-Auth RCE Flaw Found in F5 Big-IP Platform — Patch ASAP!

Microsoft Issues Security Patches for 82 Flaws — IE 0-Day Under Active Attacks

Microsoft Exchange Hackers Also Breached European Banking Authority

Number of ransomware attacks grew by more than 150%

Researchers Find 3 New Malware Strains Used by SolarWinds Hackers

Security starts with architecture

Shelter for internet outcasts Parler slaps Amazon with fresh lawsuit after abandoning first attempt

Hackers hit Microsoft Exchange Server to steal email data

URGENT — 4 Actively Exploited 0-Day Flaws Found in Microsoft Exchange

Why do companies fail to stop breaches despite soaring IT security investment?

Data is most at risk on email, with 83% of organizations experiencing email data breaches

Two ransomware strains target VMware’s ESXI hypervisor through stolen vCenter creds

NSA Releases Guidance on Zero-Trust Architecture

Go malware is now common, having been adopted by both APTs and e-crime groups

Cisco Releases Security Patches for Critical Flaws Affecting its Products

Microsoft Releases Free Tool for Hunting SolarWinds Malware

5 Key Steps Schools Can Take to Defend Against Cyber Threats

Critical RCE Flaws Affect VMware ESXi and vSphere Client — Patch Now

Shadow Attacks Let Attackers Replace Content in Digitally Signed PDFs

Worldwide zero trust security market size to reach $51.6 billion by 2026

Database encryption: Protecting the crown jewels

The video call apps linking home workers with strangers

New Hack Lets Attackers Bypass MasterCard PIN by Using Them As Visa Card

Business email compromise is a top concern for banks

Healthcare breaches increased over 50% in 2020

How can we protect ourselves against fake news and manipulation?

More bosses are using software to monitor remote workers. Not everyone is happy about it

Malware increased by 358% in 2020

Malware Exploits Security Teams’ Greatest Weakness: Poor Relationships With Employees

Bill Gates: Solving Covid easy compared with climate

Customers turned to digital channels in 2020. What will you do when they stay there in 2021?

On the Radar: Twingate Offers an Easy-to-Use Zero-Trust Access Service

For SOC teams, the analytics and automation hype is real

Zero Trust in the Real World

NHS Staff Hit by Almost 140,000 Malicious Emails in 2020

Big jump in RDP attacks as hackers target staff working from home

Malicious Chrome, Edge extensions manipulating Google search results

Israeli hackers breach KKK-affiliated website

Container security is a priority, but who’s responsibility is it?

Strengthening Zero-Trust Architecture

Board members aren’t taking cybersecurity as seriously as they should

Ransomware Payoffs Surge by 311% to Nearly $350 Million

US Breach Volumes Fell 19% in 2020 as Ransomware Surges

Italy CERT Warns of a New Credential Stealing Android Malware

Everyone’s talking about Data Privacy Day, but who’s listening?

What happens when the internet realizes the stock market is basically a casino? They go shopping at the Mall

Streamlining cloud compliance through automation

Cybercriminals use deceased staff accounts to spread Nemty ransomware

Beware — A New Wormable Android Malware Spreading Through WhatsApp

Zero trust: A solution to many cybersecurity problems

Automation and no-code are driving the future of business operations

Exclusive: SonicWall Hacked Using 0-Day Bugs In Its Own VPN Product

Bolstering healthcare IT against growing security threats

Breach Data Shows Attackers Switched Gears in 2020

Here’s How SolarWinds Hackers Stayed Undetected for Long Enough

Malwarebytes says its Office 365, Azure tenancies have been breached, insists its tools are still safe to use

Does your cloud stack move faster than your cloud security solutions?

Vulnerabilities in Popular DNS Software Allow Poisoning

Department of Justice celebrates termination of Visa and Plaid’s $5.3 billion merger

Intel’s New vPro Processors Aim to Help Defend Against Ransomware

60% of companies’ IT modernization programs not ready for the future

SolarWinds Hit With Class-Action Lawsuit Following Orion Breach

SolarWinds mess flared in the holidays – company confirms malware targeted crocked Orion product

Microsoft Says SolarWinds Hackers Accessed Some of Its Source Code

Adobe Flash Player reaches the end of its life

Worldwide VPN market to reach $75.59 billion by 2027

Mobile Endpoint Security: Still the Crack in the Enterprise’s Cyber Armor

2021 will overburden already stressed infosec teams

KFC launches game console with built-in chicken warmer

Daimler and Infosys partner to drive IT infrastructure transformation

Ransomware Attackers Using SystemBC Malware With RAT and Tor Proxy

SolarWinds Issues Second Hotfix for Orion Platform Supply Chain Attack

Accelerated cloud migration may leave business data insecure

45M Medical Imaging Files Left Accessible Online

Adobe security update squashes critical vulnerabilities in Lightroom, Prelude

Vulnerable TCP/IP stacks open millions of IoT and OT devices to attack

Thales and Google Cloud collaborate to secures public and private clouds

Dental clinic learns of ransomware attack after phone call from hackers

Bitdefender launches cloud-based EDR solution for enterprises and MSPs

OceanLotus hackers hit macOS users with new malware

Absa data leak: Employee provided client info to third parties

LG starts indoor robot delivery service trial

84% of global decision makers accelerating digital transformation plans

A hacker is selling access to the email accounts of hundreds of C-level executives

Failing Toward Zero: Why Your Security Needs to Fail to Get Better

Sophos security breach exposes customer support records

Worldwide cloud security market to reach $20.9 billion by 2027

cPanel 2FA bypass vulnerability can be exploited through brute force

Around 18,000 fraudulent sites are created daily

Critical Unpatched VMware Flaw Affects Multiple Corporates Products

Google Cloud selected by ABB to expand the cloud footprint of its Information System services

56% of organizations faced a ransomware attack, many paid the ransom

Critical vulnerabilities in Cisco Security Manager fixed, researcher discloses PoCs

SAD DNS — New Flaws Re-Enable DNS Cache Poisoning Attacks

Two New Chrome 0-Days Under Active Attacks – Update Your Browser

Microsoft Releases Windows Security Updates For Critical Flaws

Most UK businesses using Oracle E-Business Suite are running old systems

Developing a quantum network that exchanges information across long distances by using photons

China sends ‘world’s first 6G’ test satellite into orbit

FBI: Hackers stole source code from US government agencies and private companies

Ransomware gangs that steal your data don’t always delete it

Hacker group uses Solaris zero-day to breach corporate networks

New NAT/Firewall Bypass Attack Lets Hackers Access Any TCP/UDP Service

60% of organizations have accelerated their zero trust projects

Network visibility critical in increasingly complex environments

Can automated penetration testing replace humans?

Most companies have high-risk vulnerabilities on their network perimeter

Patients in Finland blackmailed after therapy records were stolen by hackers

Attackers finding new ways to exploit and bypass Office 365 defenses

Cybersecurity is failing due to ineffective technology

Sopra Steria falls victim to ransomware attack

New Chrome 0-day Under Active Attacks – Update Your Browser Now

Moving to the cloud with a security-first, zero trust approach

Entrust launches direct-to-card solution for instant physical and mobile ID issuance

Cloud environment complexity has surpassed human ability to manage

Microsoft releases emergency security updates for Windows and Visual Studio

Google Warns of Zero-Click Bluetooth Flaws in Linux-based Devices

Threat intelligence platform market to reach $234.9 million by 2022

How will blockchain impact the global economy?

Cyberattack on London council still having ‘significant impact’

India Witnessed Spike in Cyber Attacks Amidst Covid-19 – Here’s Why?

State and local governments under siege from cyber threats

Phishing scams: The new hotspots for fraud gangs

Hacker groups chain VPN and Windows bugs to attack US government networks

Only 27.9% of organizations able to maintain compliance with the PCI DSS

ALERT! Hackers targeting IoT devices with a new P2P botnet malware

Public cloud IT infrastructure spending exceeds that for non-cloud IT infrastructure

Designer makes £77,000 from iPhone icons in a week

Ransomware: Gangs are shifting targets and upping their ransom demands

UK NCSC: Don’t disable updates so you can continue using Adobe Flash past its EOL

Phishing Attack Targets Microsoft 365 Users With Netflix & Amazon Lures

Cisco Issues Patches For 2 High-Severity IOS XR Flaws Under Active Attacks

Attacker Dwell Time: Ransomware’s Most Important Metric

Salesforce launches for Vaccines, aims to scale COVID-19 vaccinations

4.83 million DDoS attacks took place in the first half of 2020, a 15% increase

Microsoft: Some ransomware attacks take less than 45 minutes

Nokia clinches 5G deal with BT to phase out Huawei’s kit in EE network

Rising reports of fraud signal that some COVID-related schemes may just be getting started

Of course I want an Amazon drone flying inside my house. Don’t you?

Want to stop cybercrimes tearing through your network? First check your privileges

CrowdStrike acquires Preempt to provide zero trust security architecture and threat protection

Phishers are targeting employees with fake GDPR compliance reminders

NIST guide to help orgs recover from ransomware, other data integrity attacks

IT incident management challenges during the post-pandemic rush to digital

China sets out world domination plan for its digital currency

CISOs struggling to prep for security audits

Ransomware Attacks Disrupt School Reopenings

Microsoft Releases September 2020 Security Patches For 129 Flaws

VPNs: The Cyber Elephant in the Room

Securing Active Directory accounts against password-based attacks

Surging CMS attacks keep SQL injections on the radar during the next normal

Maximum Lifespan of SSL/TLS Certificates is 398 Days Starting Today

You Musk be joking: A mind-reading Neuralink chip in a pig’s brain? Downloadable memories? Telepathy? Watch and judge for yourself

It’s never the data breach — it’s always the cover-up

The global cost of cybercrime per minute to reach $11.4 million by 2021

Worldwide AI spending to reach more than $110 billion in 2024

Attackers Use Unicode & HTML to Bypass Email Security Tools

A Google Drive ‘Feature’ Could Let Attackers Trick You Into Installing Malware

‘Next-Gen’ Supply Chain Attacks Surge 430%

Microsoft Issues Emergency Security Updates for Windows 8.1 and Server 2012 R2

A New Fileless P2P Botnet Malware Targeting SSH Servers Worldwide

India to run optic fibre to 450,000 villages in 1,000 days and give 1.3bn a digital Health ID

In reality, how important is zero trust?

Organizations knowingly ship vulnerable code despite using AppSec tools

Organizations knowingly ship vulnerable code despite using AppSec tools

Microsoft Patches 120 Vulnerabilities, Two Zero-Days

Toshiba formally and finally exits laptop business

Open source tool Infection Monkey allows security pros to test their network like never before

2019 Breach Leads to $80 Million Fine for Capital One

Black Hat: Hackers can remotely hijack enterprise, healthcare Temi robots

Cybercriminals are developing and boosting their attacks

Researcher Demonstrates 4 New Variants of HTTP Request Smuggling Attack

Analysis of 92 billion rejected emails uncovers threat actors’ motivations

Telstra DNS falls over after denial of service attack

Phishing campaigns, from first to last victim, take 21h on average

NIST selects algorithms to form a post-quantum cryptography standard

Attackers are exploiting Cisco ASA/FTD flaw in search for sensitive data

Psst.. You may want to patch this under-attack data-leaking Cisco bug – and these Ripple20 hijack flaws

Cabinet Office takes over control of UK government data: Mundane machinery or Machiavellian manoeuvrings?

Email Security Features Fail to Prevent Phishable ‘From’ Addresses

27% of consumers hit with pandemic-themed phishing scams

20,000+ new vulnerability reports predicted for 2020, shattering previous records

What Organizations Need to Know About IoT Supply Chain Risk

7 VPN firms with no-logs policy end up exposing 1.2 TB of user data

Cisco releases security fixes for critical VPN, router vulnerabilities

DHS CISA tells government agencies to patch Windows Server DNS bug within 24h

Third-Party IoT Vulnerabilities: We Need a Cybersecurity Paradigm Shift

VPN firm that claims zero logs policy leaks 20 million user logs

Is DNS a vital component of your security strategy?

Remote working security challenges urge MFA implementation

A hacker is selling details of 142 million MGM hotel guests on the dark web

Zero-Trust Efforts Rise with the Tide of Remote Working

How to make your IT security go beyond your network – and make people your perimeter

Over 1,300 phishing kits for sale on hacker forum

Amazon tells employees to remove TikTok from their phones due to security risk

Backdoor accounts discovered in 29 FTTH devices from Chinese vendor C-Data

USB storage devices: Convenient security nightmares

15 billion credentials from 100,000 data breaches sold on dark web

Majority of firms concerned about public cloud security, most have suffered breach

70% of organizations experienced a public cloud security incident in the last year

Citrix Issues Critical Patches for 11 New Flaws Affecting Multiple Products

High-flying Microsoft exec jumps to Magic Leap as CEO. No, we haven’t got that the wrong way round

Microsoft Launches Free Linux Forensics and Rootkit Malware Detection Service

Coronavirus: Fujitsu announces permanent work-from-home plan

Infosec community disagrees with changing ‘black hat’ term due to racial stereotyping

F5 patches vulnerability that received a CVSS 10 severity score

Critical Apache Guacamole Flaws Put Remote Desktops at Risk of Hacking

VMware is acquiring Datrium for hybrid cloud disaster recovery

Microsoft releases emergency security update to fix two bugs in Windows codecs

Critical flaw opens Palo Alto Networks firewalls and VPN appliances to attack, patch ASAP!

Files Stolen from 945 Websites Discovered on Dark Web

SOC team members battle with burnout, overload and chaos

Most malware in Q1 2020 was delivered via encrypted HTTPS connections

Containers to capture 15 percent of all enterprise apps across 75 percent of business by 2024

Ransomware perspectives: The shape of things to come

Cloud Threats and Priorities as We Head Into the Second Half of 2020

Companies are rethinking their approach to privacy management

Australian government to build AU$4.3 million online microcredentials marketplace

Adobe wants users to uninstall Flash Player by the end of the year

How much is your data worth on the dark web?

Companies still struggle with SOC staff shortages, security skills gap

New Ripple20 Flaws Put Billions of Internet-Connected Devices at Risk of Hacking

Zero-day flaws in widespread TCP/IP library open millions of IoT devices to remote attack

As IoT devices evolve, risk management needs improvement

New Mobile Internet Protocol Vulnerabilities Let Hackers Target 4G/5G Users

Philippines government makes cloud-first a post-pandemic ‘new normal’ for all agencies

Spies Can Listen to Your Conversations by Watching a Light Bulb in the Room

What is the true extent of the modern corporate digital attack surface?

Average cost of DNS attacks hovering around $924,000

Intel CPUs Vulnerable to New ‘SGAxe’ and ‘CrossTalk’ Side-Channel Attacks

SMBleed: A New Critical Vulnerability Affects Windows SMB Protocol

Another globally distributed cloud native SQL database on the rise: Yugabyte Raises $30 Million in Series B Funding

Wipro and IBM collaborate to assist customers embark on a secure hybrid cloud journey

Five signs a virtual CISO makes sense for your organization

Hackers using malicious CV files to infect PCs with banking trojan

New ‘Tycoon’ Ransomware Strain Targets Windows, Linux

Cisco’s warning: Critical flaw in IOS routers allows ‘complete system compromise’

Cybercriminals exposed 5 billion records in 2019, costing U.S. organizations over $1.2 trillion

Cloud computing: Google signs ‘milestone’ discount deal with UK government

Blackpoint Cyber launches 365 Defense, a Microsoft 365 security add-on for its MDR service

Microsoft ‘to replace journalists with robots’

Famous video apps with 157M+ installations operating as spyware

Minted confirms data breach as Shiny Hunters sell its database

Hackers breached six Cisco servers through SaltStack Salt vulnerabilities

Malaysia’s Axiata to pick two 5G vendors, in move that could curb reliance on Huawei

Maintaining the SOC in the age of limited resources

IBM’s sacking spree reaches Australia and as staff wait to exit they’re being offered $4k to find new workers

Amazon in advanced talks to buy self-driving startup Zoox: WSJ

Exclusive: Hacker selling 500 million Facebook user data from 82 countries

Tencent to invest $70 billion in ‘new infrastructure’

So how are your remote working tools shaping up?

IoT security: In 2020, action needs to match awareness

Thousands of enterprise systems infected by new Blue Mockingbird malware gang

6 million COVIDSafe downloads and a AU$60b JobKeeper data error

Nutanix and ServiceNow expand integration to help customers streamline their IT operations and costs

Personal data of 12 million Facebook users exposed online

25 million user records leak online from popular math app Mathway | ZDNet

Windows malware opens RDP ports on PCs for future remote access

Privilege escalation vulnerability patched in Docker Desktop for Windows

IBM making big job cuts – even to Watson and AI – as it ‘pivots’ to cloud

HPE’s Black Thursday: Staff face pay cuts or the ax, office closures to save $1bn+ after coronavirus slams IT titan

Hackers Serve Up Stolen Credentials from Home Chef

Is Zero Trust the Best Answer to the COVID-19 Lockdown?

New DNS Vulnerability Lets Attackers Launch Large-Scale DDoS Attacks

db8151dd breach- Contact management firm leaks 22 million emails

Inside big tech’s high-stakes race for quantum supremacy

Security threats associated with shadow IT

Supercomputers hacked across Europe to mine cryptocurrency

Facebook buys GIF-maker Giphy to add to Instagram team

Mikroceen RAT backdoors Asian government networks in new attack wave

Hackers target the air-gapped networks of the Taiwanese and Philippine military

Microsoft Patch for Reverse RDP Flaw Leaves Room for Other Attacks

Two Critical vulnerabilities in Sophos Cyberoam firewall can allow network takeover

New malware Ramsay can steal data from air-gapped computers

Researcher Spots New Malware Claimed to be ‘Tailored for Air‑Gapped Networks’

Data Breach Exposes Four Million Dating App Users

Researchers detected 400 million malware infections in April 2020

Hackers infect authentic 2FA app to infect Mac devices with malware

US Marshals Service exposed prisoner details in security breach

Google expects its staff to work from home until 2021 and it’s not alone

Hacker gains access to a small number of Microsoft’s private GitHub repos

Jump in vulnerable RDP ports is leaving networks open to hacking and cyberattacks

Facebook Launches ‘Discover,’ A Secure Proxy to Browse the Internet for Free

Sensitive user data found in Tesla car parts sold on eBay

Warning: Citrix ShareFile Flaw Could Let Attackers Steal Corporate Secrets

New Kaiji malware targets IoT devices via SSH brute-force attacks

Hacker leaks 15 million records from Tokopedia, Indonesia’s largest online store

As Brit cyber-spies drop ‘whitelist’ and ‘blacklist’, tech boss says: If you’re thinking about getting in touch saying this is political correctness gone mad, don’t bother

Dell to unleash hybrid server/storage boxen that can run virtual machines

New nasty Android EventBot malware infects devices by evading 2FA

Here’s the NSA’s guide for choosing a safe text chat and video conferencing service

New Android Malware Steals Banking Passwords, Private Data and Keystrokes

Microsoft Office 365: US issues security alert over rushed remote deployments

Organizations look to build resiliency with hybrid and multi-cloud architectures

Android users worldwide hit by sophisticated Google Play malware

Researchers Spot Banking Trojan Using #COVID19 Crisis to Attack Users

Ransomware hackers leak pharmaceutical giant’s data on dark web

Chinese COVID-19 detection firm hacked; source code sold on dark web

Dark web hackers selling 400,000 South Korean & US payment card data

VictoryGate cryptominer infected 35,000 devices via USB drives

Wake up, Neo: Microsoft mulls using your brain waves or body heat to mine crypto-currency while viewing ads

Symlink race bugs discovered in 28 antivirus products

Latest iOS Text Bomb Bug Crashing iPhones with Sindhi Characters

Post-lockdown life in Wuhan is a warning to the world

Work-from-home creates multitude of opportunities for leaks

Parablu launches BluVault, a SaaS backup solution for Microsoft Office 365

Google shifting workloads to run when the sun will shine and the wind will blow

Security researcher identifies new APT group mentioned in 2017 Shadow Brokers leak

Zero-Day Warning: It’s Possible to Hack iPhones Just by Sending Emails

Google Cloud’s Anthos for AWS generally available, Microsoft Azure in preview

Chinese Hackers Using New iPhone Hack to Spy On Uyghur Muslims

Has coronavirus killed the UK’s startup dreams? Ask Deliveroo

Netflix says subscriptions just boomed but tells investors it’s no money heist and they should expect stranger things

Python 2 bows out after epic transition. And there was much applause because you’ve all moved to version 3, right? Uh, right?

Google helps users reduce Google Cloud costs

Researcher Discloses 4 Zero-Day Bugs in IBM’s Enterprise Security Software

IBM CEO Krishna outlines grand plan: Technical prowess, growth, client focus

Three years ago, IBM ordered staff to work in central hubs. Now its new CEO ponders mid-pandemic: Is there a better way of doing things?

IBM misses revenue estimates but cloud jumps; withdraws forecast

Hackers selling 267 million Facebook records on hacker forum

Fraud & hacking guides are the most sold item on dark web

Google calls a halt on Chrome 82, but the version 83 beta has arrived early – so it’s coding and bug finding time ahead

PoetRAT Trojan targets energy sector using coronavirus lures

Google: We Block 240 Million Daily #COVID19 Spam Messages

Academics steal data from air-gapped systems using PC fan vibrations

Bad news: So much of your personal data has been hacked that lesson manuals on how to use it are the latest hot property

Energy Giant EDP Hit With €10 Million Ransomware Threat

Slack Incoming Webhooks Can Be Weaponized in Phishing Attacks

Phishing kit prices skyrocketed in 2019 by 149%

Another day, another Google cull – Chocolate Factory axes 49 malicious Chrome extensions from web store

Microsoft April 2020 Patch Tuesday comes with fixes for four zero-days

Microsoft Issues Patches for 3 Bugs Exploited as Zero-Day in the Wild

Second-wave dotcom Uber-investor Softbank forecasts gargantuan losses as world economy faces slump

Microsoft’s Teams clocks 2.7 billion minutes of meetings in a single day as April starts to run out for Windows 10 2004

Russian state hackers behind San Francisco airport hack

52k Iranian ID cards with selfies sold on dark web & hacking forum

7 Ways Hackers and Scammers Are Exploiting Coronavirus Panic says orders had only temporarily decline in March

Hackers are scanning for vulnerable VPNs in order to launch attacks against remote workers

Microsoft: Cyber-Criminals Are Targeting Businesses Through Vulnerable Employees

Microsoft to add DANE and DNSSEC support to Exchange Online servers

Microsoft buys domain in the name of customer security

Secure Remote Working During COVID-19 — Checklist for CISOs

Email provider got hacked, data of 600,000 users now sold on the dark web

IBM taps former Bank of America CTO to oversee cloud business

Zoom Blow as Thousands of User Videos Are Found Online

Researcher Hijacks iOS, macOS Camera with Three Safari Zero-Days

Zoom Patches Three New Bugs in Scramble to Support Remote Workers

How Just Visiting A Site Could Have Hacked Your iPhone or MacBook Camera

Most find data security challenging with respect to UCaaS/CCaaS deployments

Terabytes of OnlyFans data being sold on hacking forum

Are your MS SQL servers part of a cryptomining botnet? Check now!

Magecart Hackers Inject iFrame Skimmers in 19 Sites to Steal Payment Data

How can you strengthen an enterprise third-party risk management program?

Why All Employees Are Responsible for Company Cybersecurity

Millions of routers running OpenWRT vulnerable to attack

CISO’s guide to choosing an automated security questionnaire platform

Houseparty denies hacking user accounts; offers $1 million reward

Hackers sending malware infected USBs with Best Buy Gift Cards

Microsoft buys cloud-based 5G services vendor Affirmed Networks

TrickBot Mobile App Bypasses 2‐Factor Authentication for Net Banking Services

Critical RCE Bug Affects Millions of OpenWrt-based Network Devices

Working from home? Switch off Amazon’s Alexa (say lawyers)

Brazilian startup develops rapid Covid19 test

DDoS botnets have abused three zero-days in LILIN video recorders for months

German army’s sensitive data found on laptop bought from eBay

Cisco fixes root privilege, command injection vulnerabilities in Cisco SD-WAN solution

Windows, Ubuntu, macOS, VirtualBox fall at Pwn2Own hacking contest

Windows 10 or Mac user? Patch Adobe Reader and Acrobat now to fix 9 critical security flaws

VMware patches privilege escalation vulnerability in Fusion, Horizon

Adobe Releases Critical Patches for Acrobat Reader, Photoshop, Bridge, ColdFusion

Nigerian spammer made 3X average national salary firehosing macro-laden Word docs at world+dog

Medical robots pick up the slack in overloaded hospitals

Amazon to hire 100,000 employees to cope with COVID-19 demand

How the Rise of IoT Is Changing the CISO Role

Microsoft Issues March 2020 Updates to Patch 115 Security Flaws

Hackers leak up to 4 TB of OnlyFans content for download

Microsoft is retiring its MCSA, MCSD and MCSE certifications in June 2020

One in four Americans won’t do business with data-breached companies

Maybe data centers aren’t actually so bad for the planet

Ransomware victims thought their backups were safe. They were wrong

New Wi-Fi Encryption Vulnerability Affects Over A Billion Devices

Microsoft to open Azure regions in Spain, expands Telefonica relationship

Firefox enables DNS-over-HTTPS by default (with Cloudflare) for all U.S. users

Install Latest Chrome Update to Patch 0-Day Bug Under Active Attacks

Slickwraps Breach Hits 857,000 Customers

PayPal rejects report that exposed critical account takeover vulnerabilities

Changing the mindset of the CISO: From enforcer to enabler

#Privacy: Unprotected machine IDs set to cause global losses of at least $51bn losses

Cybersecurity vs. Information Security: Is There a Difference? – Cloud Academy

Passwordless authentication is here and there, but not everywhere

97% of IT leaders worried about insider data breaches

Apple joins industry effort to eliminate passwords

New Jersey Hospital Network Faces Lawsuit Over Ransomware Attack

Redefining Zero Trust: Does Zero Really Mean Zero?

How to Get CISOs & Boards on the Same Page

Cybersecurity job market set to worsen once more – ITProPortal

Private details of 10.7 million MGM Hotel guests sold on Dark Web

#Privacy: C-suite fears grow over cybersecurity talent shortage

#Privacy: Cybercriminals exploited previously stolen credentials or known software vulnerabilities last year

FireEye Mandiant M-Trends 2020 Report Reveals Cyber Criminals Are Increasingly Turning to Ransomware as a Secondary Source of Income – Yahoo Finance

Hack Of Patient Survey Firm NRC Health Raises Questions Over US Records Security

Researchers recovered 9 billion email & password combos in 2019

SIEM Still Creates Complexity and Administration Challenges

5 Strategies to Secure Cloud Operations Against …

Chinese Hackers Target Asian Betting Firms

Russia Blocks Encrypted Email Service Tutanota

Iranian Hackers Exploiting VPN Flaws to Backdoor Organizations Worldwide

Two-Thirds of CISOs Struggling with Skills Shortages

The role played by CISOs in addressing cybersecurity challenges: Akshay Aggarwal, Oracle India – DATAQUEST

Iranian APT group hacking VPN servers for “Fox Kitten Campaign”

Global Cyber Threats on the Rise with No Respite – Latest Hacking News

A Dozen Vulnerabilities Affect Millions of Bluetooth LE Powered Devices

Artificial Intelligence – The Next Frontier in IT Security? | Fast Future Publishing

Kaspersky reveals magnitude of British business ‘cyber-complacency’ – Software Testing News

New Election App Breaches Exposed Data on Millions of Israelis, Again

The Good, the Bad and the Ugly in Cybersecurity – Week 7

IoT device security: 5 tips for enterprises

Pay for these four tech jobs is rocketing. Cloud computing is the cause

Download: Definitive ‘IR Management and Reporting ‘ Presentation Template

Mac threats are growing faster than their Windows counterparts

Data security startup Open Raven launches to prevent data breaches – Business Insider

Update Microsoft Windows Systems to Patch 99 New Security Flaws

Adobe Releases Patches for Dozens of Critical Flaws in 5 Software

Cybersecurity is a board level issue: 3 CISOs tell why

How to Protect Your Network Infrastructure and Apps from DDoS Attacks?

Shadow IT accounts with weak passwords endanger organizations

The Oscar nominated movie you just downloaded could be a malware

Hackers can steal data from air-gapped PC using screen brightness

5 High Impact Flaws Affect Cisco Routers, Switches, IP Phones and Cameras

Hackers Exploited Twitter Bug to Find Linked Phone Numbers of Users

Zero Trust: a quick guide to upping your cybersecurity game

This website uses cookies to ensure you get the best experience on our website.


For further information on how The Human Error can help you. Fill out some details below, or give us a call.

Tel: 03300 417126



See All The Gaps.


Dark Threat Hunting Policy Hardening IOT & Shadow IT reporting Detects "In Progress" Attacks Alerts On Insider Threats Installs in minutes

70,000 Thoughts a day.
We Make Mistakes.