News
-
"Personal Information of Nearly Two Million Texans Exposed"The personal information of nearly two million Texans was exposed for almost three years due to a programming issue at the Texas Department of Insurance (TDI). The department revealed that details of 1.8 million workers who have filed compensation…
-
"U.S. Warns of North Korean Hackers Posing as IT Freelancers"The U.S. Department of State, the U.S. Department of the Treasury, and the Federal Bureau of Investigation, recently warned that organizations should be careful when employing IT freelancers because they may be hiring North Korean hackers. North Korean…
-
"AcidRain Malware Shuts Down Thousands of Modems in Ukraine"According to a recent Viasat report, a cyberattack rendered Viasat KA-SAT modems nonfunctional throughout Ukraine on February 24. As a result of the attack, remote monitoring and control of 5,800 Enercon wind turbines in Germany were disabled. A recently…
-
"Over 380,000 Kubernetes API Servers Exposed to Internet: Shadowserver"The Shadowserver Foundation, a nonprofit cybersecurity organization, has started scanning the internet for Kubernetes API servers and found roughly 380,000 that allow some form of access. Shadowserver is conducting daily scans of the IPv4 space on ports…
-
"APTs Overwhelmingly Share Known Vulnerabilities Rather Than Attack 0-Days"A study conducted by researchers at the University of Trento in Italy calls on organizations to prioritize existing vulnerabilities to mitigate the risk of compromise. Their research found that most Advanced Persistent Threat (APT) groups exploit known…
-
"Digital Skimming is Now the Preserve of Non-Magecart Groups"According to new research at RiskIQ, less than a fifth of digital skimming activity at the start of the year was linked to Magecart groups, as cheap tools lowered the barrier to entry for less sophisticated cybercriminals. Researchers analyzed the…
-
"Western Allies Warn of Top Cyberattack Mistakes"The security agencies of five countries have outlined 10 of the most common ways threat actors compromise their victims, most of which can be mitigated by basic cyber-hygiene best practices. Cybersecurity authorities of the US, Canada, New Zealand, the…
-
"Large-Scale Attack Targeting Tatsu Builder WordPress Plugin"Security researchers have found that tens of thousands of WordPress websites are potentially at risk of compromise as part of an ongoing large-scale attack targeting a remote code execution vulnerability in the Tatsu Builder plugin. The…
-
"FBI: Hackers Used Malicious PHP Code to Grab Credit Card Data"The Federal Bureau of Investigation (FBI) has issued a warning pertaining to a malicious actor stealing credit card information from the checkout pages of US firms' websites. According to the FBI, unidentified cyber actors scraped credit card data from a…
-
"Weak Security Controls and Practices Routinely Exploited for Initial Access"Cyber actors commonly use misconfigured or unsecured security configurations, weak controls, and other bad cyber hygiene practices to gain initial access or compromise a victim's system. A joint Cybersecurity Advisory co-authored by the cybersecurity…
-
"IBM, HBCUs Partner to Tackle Cybersecurity Talent Shortage"IBM has announced education initiatives with the US Department of Veterans Affairs, the Specialisterne Foundation, and six Historically Black Colleges and Universities (HBCUs) to provide free Science, Technology, Engineering, and Mathematics (STEM) job…
-
"NVIDIA Fixes Ten Vulnerabilities in Windows GPU Display Drivers"NVIDIA has issued a security update for various graphics card models to fix four high-severity and six medium-severity vulnerabilities in its GPU drivers. The security update addresses flaws that malicious actors can exploit for Denial-of-Service (DoS),…