Threatpost
Swiss Army Knife for Information Security: What Is Comprehensive Protection?
A vendor develops the series logically so that the tools do not just cover individual needs, but complement each other. For example, the concept of SearchInform is to ensure control of threats at all levels of the information network: from hardware and software to file systems and databases, from user actions on a PC to their activity on the Internet.
Kategorie: Hacking & Security
Novel Email-Based Campaign Targets Bloomberg Clients with RATs
Attacks dubbed ‘Fajan’ by researchers are specifically targeted and appear to be testing various threat techniques to find ones with the greatest impact.
Kategorie: Hacking & Security
Mozilla Fixes Firefox Flaw That Allowed Spoofing of HTTPS Browser Padlock
The Mozilla Foundation releases Firefox 88, fixing 13 bugs ranging from high to low severity.
Kategorie: Hacking & Security
GEICO Alerts Customers Hackers Stole Driver License Data for Two Months
The second-largest auto insurance provider in the U.S. has since fixed the vulnerability that exposed information from its website.
Kategorie: Hacking & Security
NitroRansomware Asks for $9.99 Discord Gift Codes, Steals Access Tokens
The malware seems like a silly coding lark at first, but further exploration shows it can wreak serious damage in follow-on attacks.
Kategorie: Hacking & Security
Ransomware: A Deep Dive into 2021 Emerging Cyber-Risks
Our new eBook goes beyond the status quo to take a look at the evolution of ransomware and what to prepare for next.
Kategorie: Hacking & Security
What COVID-19 Taught Us: Prepping Cybersecurity for the Next Crisis
Sivan Tehila, cybersecurity strategist at Perimeter 81, discusses climate change and the cyber-resilience lessons companies should take away from dealing with the pandemic.
Kategorie: Hacking & Security
BazarLoader Malware Abuses Slack, BaseCamp Clouds
Two cyberattack campaigns are making the rounds using unique social-engineering techniques.
Kategorie: Hacking & Security
iOS Kids Game Morphs into Underground Crypto Casino
A malicious ‘Jungle Run’ app tricked security protections to make it into the Apple App Store, scamming users out of money with a casino-like functionality.
Kategorie: Hacking & Security
NSA: 5 Security Bugs Under Active Nation-State Cyberattack
Widely deployed platforms from Citrix, Fortinet, Pulse Secure, Synacor and VMware are all in the crosshairs of APT29, bent on stealing credentials and more.
Kategorie: Hacking & Security
Mandiant Front Lines: How to Tackle Exchange Exploits
Matt Bromiley, senior principal consultant with Mandiant, offers checklists for how small- and medium-sized businesses (SMBs) can identify and clear ProxyLogon Microsoft Exchange infections.
Kategorie: Hacking & Security
Google Project Zero Cuts Bug Disclosure Timeline to a 30-Day Grace Period
The zero-day flaw research group has revised its disclosure of the technical details of vulnerabilities in the hopes of speeding up the release and adoption of fixes.
Kategorie: Hacking & Security
Biden Races to Shore Up Power Grid Against Hacks
A 100-day race to boost cybersecurity will rely on incentives rather than regulation, the White House said.
Kategorie: Hacking & Security
Gafgyt Botnet Lifts DDoS Tricks from Mirai
The IoT-targeted malware has also added new exploits for initial compromise, for Huawei, Realtek and Dasan GPON devices.
Kategorie: Hacking & Security
Attackers Target ProxyLogon Exploit to Install Cryptojacker
Threat actors targeted compromised Exchange servers to host malicious Monero cryptominer in an “unusual attack,” Sophos researchers discovered.
Kategorie: Hacking & Security
Security Bug Allows Attackers to Brick Kubernetes Clusters
The vulnerability is triggered when a cloud container pulls a malicious image from a registry.
Kategorie: Hacking & Security
Ransomware Attack Creates Cheese Shortages in Netherlands
Not a Gouda situation: An attack on a logistics firm is suspected to be related to Microsoft Exchange server flaw.
Kategorie: Hacking & Security
FBI Clears ProxyLogon Web Shells from Hundreds of Orgs
In a veritable cyber-SWAT action, the Feds remotely removed the infections without warning businesses beforehand.
Kategorie: Hacking & Security
A Post-Data Privacy World and Data-Rights Management
Joseph Carson, chief security scientist at Thycotic, discusses the death of data privacy and what comes next.
Kategorie: Hacking & Security
100,000 Google Sites Used to Install SolarMarker RAT
Search-engine optimization (SEO) tactics direct users searching for common business forms such as invoices, receipts or other templates to hacker-controlled Google-hosted domains.
Kategorie: Hacking & Security
- 1
- 2
- 3
- 4
- 5
- následující ›
- poslední »