Archive

Next month marks the 30th anniversary of the first ever ransomware attack, and according to new research this particular form of malware is still going strong. According to the “Mid-Year Threat Landscape Report” published yesterday by Bitdefender, ransomware increased 74.23%

Truecaller fixed a security flaw that may expose sensitive user data, location, and system information. The flaw was discovered by an India-based security researcher Ehraz Ahmed. Truecaller is the most popular smartphone app that includes features such as caller-identification, call-blocking,

Personal information on over one billion individuals harvested by two data enrichment firms has been exposed online, according to security researchers. Data enrichment or aggregation providers effectively sell access to large stores of data merged from multiple third-party sources, primarily

The UK’s Ministry of Justice is inviting bids for the creation of a single, centralized cybersecurity log collection and aggregation platform. With a diverse digital estate and a wide variety of suppliers and technical systems, the MoJ is in need

A new malicious downloader dubbed “DePriMon” registers itself as fake Windows Default Print Monitor to achieve persistence and to execute commands as a SYSTEM user. The DePriMon malware found to be active at least from March 2017, it was detected

Twitter has finally remediated a two-factor authentication (2FA) security gap which could allow SIM swap attackers to unlock users’ accounts. Until now, the firm has mandated that all users wanting to use strong authentication on their accounts must first enable

Jamie Bartlett gave the closing keynote session, ‘Privacy, the Dark Web & Democracy: Uncovering the Digital Underworld,’ at the Infosecurity ISACA North America Expo and Conference in New York this week. Bartlett, a British author and journalist who specializes in

Crooks behind the Raccoon Stealer have adopted a simple and effective technique to circumvent popular anti-spam messaging gateways. Cybercriminals behind the Raccoon Stealer have adopted a simple and effective technique to circumvent Microsoft and Symantec anti-spam messaging gateways. The Raccoon

Researchers found 37 vulnerabilities in four common open-source VNC remote desktop applications that exist since 1999. These vulnerabilities allow attackers to compromise the targeted systems remotely. According to Kaspersky’s analysis, more than 600,000 VNC servers accessed remotely over the Internet,

Security researchers found an open Elasticsearch server that contains unique data sets of more than 1.2 billion users. The data found to associated with 2 different data enrichment companies. The data enrichment is a process of enhancing the data of

Half of global organizations still don’t have cyber insurance, despite the majority believing cyber-attacks will increase next year, according to FireEye. The security vendor polled 800 CISOs and senior executives across the globe to compile its new Cyber Trendscape Report.

A new study has found that more than half of organizations believe detecting insider threats is harder following migration to the cloud. The 2020 Insider Threat Report published today found that a lack of visibility into anomalous activity, especially in

Insider threats are very real and make up the majority of cybersecurity attacks on enterprises. Yet, many businesses still spend most of their time safeguarding their systems against outsider threats. The worst with insider threats is that they often have

With only 36% of businesses prepared to respond to a data breach, it’s clear that many companies remain at risk of a significantly damaging breach of information in lieu of the digital age. However, while both physical and cybersecurity protections

Some 60% of global security professionals misunderstand the concept of “shared responsibility” in the cloud, potentially putting their organizations at risk, according to Centrify. The identity and access management (IAM) vendor polled 700 cybersecurity pros to compile its new report,

OnePlus discloses a security breach, the company says that hackers accessed customers’ personal information users’ name, contact number, email and shipping address. The security incident was identified by OnePlus last week, some unauthorized user accessed the database where the customer’s