Left unpatched, pair of vulnerabilities could give attackers wide access to a victim’s application delivery network. from Dark Reading: https://ift.tt/3eQ1TdT via IFTTTRead More BG-IP Vulnerabilities Could be Big Trouble for Customers
After Senate Judiciary Committee pushes EARN IT Act a step closer to ratification, raising further concerns for privacy advocates, here’s what to know. from Dark Reading: https://ift.tt/2BwQP71 via IFTTTRead More Making Sense of EARN IT & LAED Bills’ Implications for Crypto
Three steps to better serve consumers, ensure maximum security, and achieve compliance with the California Consumer Privacy Act. from Dark Reading: https://ift.tt/2NSmClv via IFTTTRead More Considerations for Seamless CCPA Compliance
An attacker scanned for databases misconfigured to expose information and wiped the data, leaving a ransom note behind. from Dark Reading: https://ift.tt/3glEwcx via IFTTTRead More 22,900 MongoDB Databases Affected in Ransomware Attack
We need to learn from the attacks and attempts that have occurred in order to prepare for the future. from Dark Reading: https://ift.tt/2YPLkJw via IFTTTRead More Lessons from COVID-19 Cyberattacks: Where Do We Go Next?
Backdoors, cryptominers, and ransomware were the most widely detected threats by the DHS Cybersecurity and Infrastructure Security Agency (CISA)’s intrusion prevention system EINSTEIN. from Dark Reading: https://ift.tt/2NQU7V6 via IFTTTRead More DHS Shares Data on Top Cyber Threats to Federal Agencies
Malware used to download WastedLocker on target networks was hosted on legit websites belonging to one parent company, Symantec says. from Dark Reading: https://ift.tt/2AkUYKE via IFTTTRead More Attackers Compromised Dozens of News Websites as Part of Ransomware Campaign
Follow-up sandbox research confirms Aisino knew about the malware in its tax software, though it’s still unclear whether it was culpable. from Dark Reading: https://ift.tt/2NNzPvL via IFTTTRead More Chinese Software Company Aisino Uninstalls GoldenSpy Malware