-
Organizations Warned of New Attack Vector in Amazon Web Services
PRIVACY PRIVACY Researchers warned that threat actors could potentially exploit Elastic IP transfer and compromise an IP address Read More
-
BrandPost: Managing Risk Would be Easier if It Weren’t for People
PRIVACY PRIVACY Businesses are as much at risk from human error as from threat actors. Typos, configuration errors, and other human errors can lead to disaster on the same scale as any modern cyberthreat. Great technology defenses can only get you so far with managing risk. It is generally agreed upon that Zero Trust principles…
-
Trojaned Windows Installer Targets Ukraine
PRIVACY PRIVACY Mandiant is reporting on a trojaned Windows installer that targets Ukrainian users. The installer was left on various torrent sites, presumably ensnaring people downloading pirated copies of the operating system: Mandiant uncovered a socially engineered supply chain operation focused on Ukrainian government entities that leveraged trojanized ISO files masquerading as legitimate Windows 10…
-
UK Privacy Regulator Names and Shames Breached Firms
PRIVACY PRIVACY ICO publishes detailed list of complaints and investigations Read More
-
Fortnite Dev to Pay $520m in Record-Breaking Settlement
PRIVACY PRIVACY FTC reveals gaming firm’s privacy violations and design tricks Read More
-
How to enable event collection in Windows Server
PRIVACY PRIVACY Event logs register information about software and hardware events that occur in a system, and they are a key weapon in the arsenal of computer security teams. Windows Server has offered Windows Event Forwarding (WEF) for aggregating system event logs from disparate systems to a central event log server for several versions now.…
-
Ukraine’s Delta Military Intel System Hit by Attacks
PRIVACY PRIVACY Phishing campaign spotted by CERT-UA Read More
-
Hacked Ring Cams Used to Record Swatting Victims
PRIVACY PRIVACY Photo: BrandonKleinPhoto / Shutterstock.com Two U.S. men have been charged with hacking into the Ring home security cameras of a dozen random people and then “swatting” them — falsely reporting a violent incident at the target’s address to trick local police into responding with force. Prosecutors say the duo used the compromised Ring…
-
The Smart Home Security Guide
PRIVACY PRIVACY The smarts behind a smart home come from you. At least when it comes to keeping it more private and secure. Without question, smart home devices have truly stormed the marketplace. We’ve gone from a handful of relatively straightforward things like connected lights, outlets, and cameras to a wide range of fully connected…
-
Ransomware Groups to Increase Zero-Day Exploit-Based Access Methods in the Future
PRIVACY PRIVACY Trend Micro’s latest research paper analyzed ways in which ransomware groups could evolve to stay on top of strengthened cyber-protection measures Read More