News
-
"T-Mobile Faces Yet Another Data Breach"T-mobile USA has reported a data breach that occurred last week via its website, its fourth data breach in three years. The data that was accessed by the adversary is customer proprietary network information (CPNI). CPNI is some of the most…
-
"Can We Be Manipulated Into Sharing Private Info Online? Yes, Says Ben-Gurion U. Study"According to a new study conducted by Ben-Gurion University of the Negev (BGU) researchers, online users are more likely to disclose private information depending on how website forms ask for information. Their study demonstrated how smartphone and PC…
-
"Government Security Experts Issue Farmers with New Advice"The UK's National Cyber Security Centre (NCSC) issued cybersecurity guidance for farmers as cyberthreats facing rural businesses continue to grow. The comprehensive guide, titled "Cybersecurity for Farmers," outlines best practices for recognizing…
-
"Whirlpool Hit With Ransomware Attack"The major appliances giant Whirlpool acknowledges it was hit with a ransomware attack in November. Whirlpool stated that they were unaware of any consumer information being exposed because of the attack and that the ransomware is not causing any…
-
"Worldwide VPN Market to Reach $75.59 Billion by 2027"Researchers have found that the global VPN market was valued at $25.41 billion in 2019 and is projected to reach $75.59 billion by 2027, growing at a compound annual growth rate of 14.7% from 2020 to 2027. The major factors driving the VPN…
-
"Data Breach Broker Selling User Records Stolen From 26 Companies"BleepingComputer has discovered that a data breach broker is selling more than 360 million user records allegedly stolen from 26 companies on a hacker forum. Threat actors and hacking groups commonly work with data breach brokers to market and sell the…
-
"New Golang Worm Turns Windows and Linux Servers Into Monero Miners"Researchers from Intezer released details about a new Golang-based worm that drops XMRig cryptocurrency miners on Windows and Linux servers. According to the researchers, the worm targets MySQL, Jenkins, Tomcat, WebLogic, and other public-facing services…
-
"DDoS Attacks Spiked, Became More Complex in 2020"There has been a significant increase in Distributed Denial-of-Service (DDoS) attacks as a result of the large-scale shift to remote work among organizations and the increased use of online services during the COVID-19 pandemic. DDoS mitigation service…
-
"Hackers Threaten to Leak Plastic Surgery Pictures"The ransomware gang known as REvil has stolen data from the Transform Hospital Group, which is the UK's leading specialist weight loss and cosmetic surgery group. REvil claims to be in possession of patients' before and after photos. The group also…
-
"NIST Shares Best Practice Security Guidance for Vulnerable PACS"The National Institute of Standards (NIST) released cybersecurity guidance for the Picture Archiving Communication System (PACS), which manages medical images. PACS enables the acceptance, transfer, display, storage, and digital processing of medical…
-
"6 Questions Attackers Ask Before Choosing an Asset to Exploit"According to David "moose" Wolpoff, co-founder and CTO at Randori, he believes that understanding the hacker's logic is important. If hacker logic is applied in an enterprise, then the enterprise's security strategy will shift, leading to more…
-
"FBI: Home Surveillance Devices Hacked to Record Swatting Attacks"The FBI has issued an alert on Tuesday that swatters have been hijacking home surveillance and other types of devices with audio and video capabilities to watch their victims while they are being swatted. In some cases, the prankster also live-streams…