News

  • Ukraine, Conti, and the law of unintended consequences

    PRIVACY PRIVACY The Russian invasion of Ukraine has demonstrated the law of unintended consequences in a most unexpected way.  By publicly backing the invasion, the heretofore most prolific ransomware group in the world inspired a backlash that appears to have temporarily crippled the group’s ability to operate and given unprecedented insight into the world of…

    Read More

  • LAPSUS$ hacks Globant. 70GB of data leaked from IT firm

    PRIVACY PRIVACY International IT and software development firm Globant has confirmed that an increasingly-notorious cybercrime gang breached its network and stole intellectual property and passwords. Read more in my article on the Hot for Security blog. Read More

    Read More

  • IT Services Giant Admits $42m Fallout from Ransomware Attack

    PRIVACY PRIVACY Atento case highlights the costs that can stem from serious breaches Read More

    Read More

  • Digital Spring Cleaning: Seven Steps for Faster, Safer Devices

    PRIVACY PRIVACY Throw open the windows and let in some fresh air. It’s time for spring cleaning. And that goes for your digital stuff too. Whether it’s indeed spring where you are or not, you can give your devices, apps, and online accounts a good decluttering. Now’s the time. Cleaning them up can protect your…

    Read More

  • Fake Emergency Search Warrants Draw Scrutiny from Capitol Hill

    PRIVACY PRIVACY On Tuesday, KrebsOnSecurity warned that hackers increasingly are using compromised government and police department email accounts to obtain sensitive customer data from mobile providers, ISPs and social media companies. Today, one of the U.S. Senate’s most tech-savvy lawmakers said he was troubled by the report and is now asking technology companies and federal…

    Read More

  • Attackers compromise 94% of critical assets within four steps of initial breach

    PRIVACY PRIVACY New research from XM Cyber analyzing the methods, attack paths, and impacts of cyberattacks has discovered that attackers can compromise 94% of critical assets within just four steps of initial breach points. The hybrid cloud security company’s Attack Path Management Impact Report incorporates insights from nearly two million endpoints, files, folders, and cloud…

    Read More

  • FBI adds LAPSUS$ data extortion gang to its “Most Wanted” list

    PRIVACY PRIVACY The FBI is calling on members of the public to help it uncover members of an increasingly-notorious cybercrime gang. Read More

    Read More

  • Remote code execution flaws in Spring and Spring Cloud frameworks put Java apps at risk

    PRIVACY PRIVACY A remote code execution vulnerability in Spring Framework has sparked fears that it could have a widespread impact across enterprise environments. Spring is one of the most popular open-source frameworks for developing Java applications. The flaw, which has since been dubbed SpringShell or Spring4Shell, came to light when a Chinese developer released a…

    Read More

  • White House Announces Possible Rise in Cyberattacks—What You Can Do to Stay Safe

    PRIVACY PRIVACY The White House recently reissued a warning to American businesses in response to the unprecedented economic sanctions the U.S. has imposed on Russia for the Ukraine invasion, stating, “There is now evolving intelligence that Russia may be exploring options for potential cyberattacks.”   Along with this statement, the White House published a fact sheet…

    Read More

  • CISA Issues UPS Warning

    PRIVACY PRIVACY Agency warns of attacks on internet-connected uninterruptible power supply devices Read More

    Read More

News, Advisories and much more

Exit mobile version