News
  • "CISA Releases New Ransomware Self-Assessment Security Audit Tool"
    The US Cybersecurity and Infrastructure Security Agency (CISA) has released the Ransomware Readiness Assessment (RRA), a new module for its Cyber Security Evaluation Tool (CSET). RRA is a security audit self-assessment tool for organizations that want to…
  • "High-Severity Vulnerabilities Found in Several Phoenix Contact Industrial Products"
    The Germany-based industrial solutions provider Phoenix Contact recently informed customers about ten vulnerabilities that have been identified across many of its products. Advisories published by Phoenix Contact and Germany's CERT VDE say the…
  • "IT, Healthcare, and Manufacturing Facing Most Phishing Attacks"
    Researchers at the email and collaboration security firm Avanan analyzed over 905 million emails for the 1H 2021 Global Phish Cyber Attack Report. The company discovered that their customers in the IT, healthcare, and manufacturing industries are most…
  • "End Users in the Dark About Latest Cyberthreats, Attacks"
    A survey was conducted by the IoT security firm Armis to which 2,000 employees across various industries responded. They were surveyed on their knowledge pertaining to current security events and best practices. The results from the survey show that…
  • "Data for 700M LinkedIn Users Posted for Sale in Cyber-Underground"
    After 500 million LinkedIn enthusiasts were affected in a data-scraping incident in April, it's happened again. Researchers at Privacy Sharks discovered a new posting with 700 million LinkedIn records on a popular hacker forum called RaidForums. The…
  • "Major Threats to Cloud Infrastructure Security Include a Lack of Visibility And Inadequate IAM"
    Researchers at Ermetic conducted a new study where they surveyed 200 CISOs and other security decision-makers and found that nearly 60% of the participants consider lack of visibility as well as inadequate identity and access management a significant…
  • "New Two-Step Algorithm Could Prove 'a Paradigm Shift' in Cloud Data Confidentiality"
    Although cloud computing provides fast, easy-to-use computing and inexpensive data storage services, the cloud environment does come with data confidentiality risks. Cryptography is a mathematical technique that strengthens cloud computing security by…
  • "Nobelium Attackers Compromised Microsoft Customer Support Agent"
    The attackers behind the SolarWinds hack carried out another malicious campaign against government agencies and IT companies. They compromised a machine belonging to a Microsoft customer support agent who had access to customer data. The attack campaign…
  • "Cobalt Strike Usage Explodes Among Cybercrooks"
    Researchers from Proofpoint have found that the use of Cobalt Strike by cybercriminals is increasing. The researchers stated that the tool has now "gone fully mainstream in the crimeware world." The researchers have tracked a year-over-year increase of…
  • "Danger Caused by Subdomains"
    A team of researchers from the Security & Privacy Research Unit at TU Wien and Ca' Foscari University discovered a new security vulnerability associated with subdomains. Large websites often consist of several subdomains (e.g., "sub.example.com"…
  • "Mercedes Benz Data Leak Includes Card and Social Security Details"
    Mercedes Benz has released details of a data breach affecting customers and prospective buyers in the US. The luxury carmaker stated that a vendor had informed them on June 11th that information belonging to customers was inadvertently made accessible on…
  • "Hackers Use Cracked Games To Make Crypto-Millions"
    Researchers at the antivirus firm Avast discovered malware in cracked versions of popular games, such as The Sims 4, Grand Theft Auto V, Far Cry 5, and more, that have been distributed for free on forums. Malware called Crackonosh was found in these…