的文章

Sodinokibi Ransomware Behind Travelex Fiasco: Report-

Sodinokibi Ransomware Behind Travelex Fiasco: Report

The Sodinokibi ransomware strain is apparently behind the New Year’s Eve attack on foreign currency-exchange giant Travelex, which has left its customers and banking partners stra...
匿名的头像-匿名3年前
02640
Widely Known Flaw in Pulse Secure VPN Being Used in Ransomware Attacks-

Widely Known Flaw in Pulse Secure VPN Being Used in Ransomware Attacks

VPN provider Pulse Secure on Monday urged customers to immediately apply a security patch if they have not yet done so. The company issued the patch last April to address a critica...
匿名的头像-匿名3年前
02430
TikTok Riddled With Security Flaws-

TikTok Riddled With Security Flaws

Researchers say they have discovered several major vulnerabilities in the short form video app TikTok. The reported vulnerabilities come as scrutiny around the Chinese-ow...
匿名的头像-匿名3年前
02640
Know your enemy: Mapping adversary infrastructure quickly and accurately-

Know your enemy: Mapping adversary infrastructure quickly and accurately

Group-IB is a known quantity in the information security arena: in the sixteen years since its inception, the company – now headquartered in Singapore – has detected&nb...
匿名的头像-匿名3年前
02290
Cisco Data Center Network Manager flaws fixed, Cisco ASA appliances under attack-

Cisco Data Center Network Manager flaws fixed, Cisco ASA appliances under attack

Cisco has fixed 12 vulnerabilities in Cisco Data Center Network Manager (DCNM), a platform for managing Cisco switches and fabric extenders that run NX-OS, and has warned about a s...
匿名的头像-匿名3年前
02320
Phishing attempts increase 400%, many malicious URLs found on trusted domains-

Phishing attempts increase 400%, many malicious URLs found on trusted domains

A new Webroot report also highlights the importance of user education, as phishing lures have become more personalized as hackers use stolen data for more than just accou...
匿名的头像-匿名3年前
02490
Edward Snowden in His Own Words: Why I Became a Whistle-Blower-

Edward Snowden in His Own Words: Why I Became a Whistle-Blower

At the age of 22, when I entered the American intelligence community, I didn’t have any politics. Instead, like most young people, I had solid convictions that I refused to accept...
Forcepoint VPN Client is Vulnerable to Privilege Escalation Attacks-

Forcepoint VPN Client is Vulnerable to Privilege Escalation Attacks

A vulnerability has been discovered in the Forcepoint VPN Client software for Windows. The flaw could enable an attacker – with an existing foothold on a system – to achieve an e...
BEC explodes as attackers exploit email’s identity crisis-

BEC explodes as attackers exploit email’s identity crisis

850,000 domains worldwide now have DMARC records, a 5x increase since 2016, according to Valimail. However, less than 17% of global DMARC records are at en...
Threat actors leverage new CaaS model to sell credentials on the underground hacking forums-

Threat actors leverage new CaaS model to sell credentials on the underground hacking forums

Malicious actors are now using a combolists-as-a-service (CaaS) model to sell credentials to other cybercrooks. Threat actors can purchase these credentials to perform account take...
Hackers Deface U.S. Gov Website With Pro-Iran Messages-

Hackers Deface U.S. Gov Website With Pro-Iran Messages

The Federal Depository Library Program (FDLP) website was defaced over the weekend to show a picture of a bloodied President Donald Trump. A U.S. government website was vandalized ...
Majority of IT departments leave major holes in their USB drive security-

Majority of IT departments leave major holes in their USB drive security

For the second year in a row, the majority of employers are failing to equip their employees with the appropriate technologies, procedures and policies to ensure data security...