-
Ukraine, Conti, and the law of unintended consequences
PRIVACY PRIVACY The Russian invasion of Ukraine has demonstrated the law of unintended consequences in a most unexpected way. By publicly backing the invasion, the heretofore most prolific ransomware group in the world inspired a backlash that appears to have temporarily crippled the group’s ability to operate and given unprecedented insight into the world of…
-
LAPSUS$ hacks Globant. 70GB of data leaked from IT firm
PRIVACY PRIVACY International IT and software development firm Globant has confirmed that an increasingly-notorious cybercrime gang breached its network and stole intellectual property and passwords. Read more in my article on the Hot for Security blog. Read More
-
IT Services Giant Admits $42m Fallout from Ransomware Attack
PRIVACY PRIVACY Atento case highlights the costs that can stem from serious breaches Read More
-
Digital Spring Cleaning: Seven Steps for Faster, Safer Devices
PRIVACY PRIVACY Throw open the windows and let in some fresh air. It’s time for spring cleaning. And that goes for your digital stuff too. Whether it’s indeed spring where you are or not, you can give your devices, apps, and online accounts a good decluttering. Now’s the time. Cleaning them up can protect your…
-
Fake Emergency Search Warrants Draw Scrutiny from Capitol Hill
PRIVACY PRIVACY On Tuesday, KrebsOnSecurity warned that hackers increasingly are using compromised government and police department email accounts to obtain sensitive customer data from mobile providers, ISPs and social media companies. Today, one of the U.S. Senate’s most tech-savvy lawmakers said he was troubled by the report and is now asking technology companies and federal…
-
Attackers compromise 94% of critical assets within four steps of initial breach
PRIVACY PRIVACY New research from XM Cyber analyzing the methods, attack paths, and impacts of cyberattacks has discovered that attackers can compromise 94% of critical assets within just four steps of initial breach points. The hybrid cloud security company’s Attack Path Management Impact Report incorporates insights from nearly two million endpoints, files, folders, and cloud…
-
FBI adds LAPSUS$ data extortion gang to its “Most Wanted” list
PRIVACY PRIVACY The FBI is calling on members of the public to help it uncover members of an increasingly-notorious cybercrime gang. Read More
-
Remote code execution flaws in Spring and Spring Cloud frameworks put Java apps at risk
PRIVACY PRIVACY A remote code execution vulnerability in Spring Framework has sparked fears that it could have a widespread impact across enterprise environments. Spring is one of the most popular open-source frameworks for developing Java applications. The flaw, which has since been dubbed SpringShell or Spring4Shell, came to light when a Chinese developer released a…
-
White House Announces Possible Rise in Cyberattacks—What You Can Do to Stay Safe
PRIVACY PRIVACY The White House recently reissued a warning to American businesses in response to the unprecedented economic sanctions the U.S. has imposed on Russia for the Ukraine invasion, stating, “There is now evolving intelligence that Russia may be exploring options for potential cyberattacks.” Along with this statement, the White House published a fact sheet…
-
CISA Issues UPS Warning
PRIVACY PRIVACY Agency warns of attacks on internet-connected uninterruptible power supply devices Read More