-
"Data Breach Broker Selling User Records Stolen From 26 Companies"BleepingComputer has discovered that a data breach broker is selling more than 360 million user records allegedly stolen from 26 companies on a hacker forum. Threat actors and hacking groups commonly work with data breach brokers to market and sell the…
-
"New Golang Worm Turns Windows and Linux Servers Into Monero Miners"Researchers from Intezer released details about a new Golang-based worm that drops XMRig cryptocurrency miners on Windows and Linux servers. According to the researchers, the worm targets MySQL, Jenkins, Tomcat, WebLogic, and other public-facing services…
-
"DDoS Attacks Spiked, Became More Complex in 2020"There has been a significant increase in Distributed Denial-of-Service (DDoS) attacks as a result of the large-scale shift to remote work among organizations and the increased use of online services during the COVID-19 pandemic. DDoS mitigation service…
-
"Hackers Threaten to Leak Plastic Surgery Pictures"The ransomware gang known as REvil has stolen data from the Transform Hospital Group, which is the UK's leading specialist weight loss and cosmetic surgery group. REvil claims to be in possession of patients' before and after photos. The group also…
-
"NIST Shares Best Practice Security Guidance for Vulnerable PACS"The National Institute of Standards (NIST) released cybersecurity guidance for the Picture Archiving Communication System (PACS), which manages medical images. PACS enables the acceptance, transfer, display, storage, and digital processing of medical…
-
"6 Questions Attackers Ask Before Choosing an Asset to Exploit"According to David "moose" Wolpoff, co-founder and CTO at Randori, he believes that understanding the hacker's logic is important. If hacker logic is applied in an enterprise, then the enterprise's security strategy will shift, leading to more…
-
"FBI: Home Surveillance Devices Hacked to Record Swatting Attacks"The FBI has issued an alert on Tuesday that swatters have been hijacking home surveillance and other types of devices with audio and video capabilities to watch their victims while they are being swatted. In some cases, the prankster also live-streams…
-
"Fresh Card Skimmer Attacks Multiple E-Commerce Platforms"Researchers with the Dutch security firm Sansec recently discovered a payment card skimmer targeting multiple content management systems that support many e-commerce sites' online checkout pages. According to a report released by the researchers, the new…
-
"Finnish Lawmakers' Emails Hacked in Suspected Espionage Incident"Email accounts belonging to Finnish lawmakers were accessed by hackers during a cyberattack on the Finnish Parliament's IT system. A statement released by Tero Muurman, the inspector at the National Bureau of Investigation, revealed that the malicious…
-
"Misconfigured AWS Bucket Exposes Hundreds of Social Influencers"Researchers at vpnMentor have discovered that a misconfigured cloud storage bucket has exposed hundreds of social media influencers' personal details, potentially putting them at risk of fraud and harassment. The misconfigured AWS S3 bucket was…
-
"Critical Flaws in Kepware Products Can Facilitate Attacks on Industrial Firms"The U.S. Homeland Security Department's Cybersecurity & Infrastructure Security Agency (CISA) recently published advisories about vulnerabilities in Kepware products discovered by researchers at the industrial cybersecurity firm Claroty. One of the…
-
"Remote Desktop Bugs: Patches That Took Priority in a Pandemic Year"Microsoft released patches for a record number of common vulnerabilities and exposures in 2020, many of which impacted the Microsoft Remote Desktop Protocol (RDP). The Remote Desktop service proved essential during the COVID-19 pandemic as many…
News