Attackers were able to compromise customers’ personal data by targeting the Accellion FTA server of a third-party vendor.
from Dark Reading: https://ift.tt/3hKyJQ2
via IFTTT
Attackers were able to compromise customers’ personal data by targeting the Accellion FTA server of a third-party vendor.
from Dark Reading: https://ift.tt/3hKyJQ2
via IFTTT
The Trojan sends information back to the attackers’ servers about the programming language of a target device.
from Dark Reading: https://ift.tt/3xrN2j9
via IFTTT
The Kaseya ransomware attack is believed to have been down to an authentication bypass. Yes, ransomware needs to be on your radar — but good authentication practices are also imperative.
from Dark Reading: https://ift.tt/2T1WgDS
via IFTTT
The National Security Agency’s gradual emergence from the shadows was “inevitable” in cybersecurity, says Vinnie Liu, co-founder and CEO of offensive security firm Bishop Fox and a former NSA analyst. Now the agency has to figure out how to best work with the private sector, especially organizations outside the well-resourced and seasoned Fortune 100.
from Dark Reading: https://ift.tt/3yASjVD
via IFTTT
Banks and hospitals may be common targets, but now commercial real estate must learn to protect itself against stealthy hackers.
from Dark Reading: https://ift.tt/3dVQOd0
via IFTTT
Automation allowed a REvil affiliate to move from exploitation of vulnerable servers to installing ransomware on downstream companies faster than most defenders could react.
from Dark Reading: https://ift.tt/2SVhV0r
via IFTTT
Researchers discover more than 170 Android apps that advertise cloud cryptocurrency mining services and fail to deliver.
from Dark Reading: https://ift.tt/2TBTeGJ
via IFTTT
The deal was announced the same day ZeroFox bought Dark Web intelligence firm Vigilante as a wave of security M&A continues.
from Dark Reading: https://ift.tt/36haHHb
via IFTTT
It organizations to immediately apply security update, citing exploit activity.
from Dark Reading: https://ift.tt/2Uz6zQg
via IFTTT
Are security attestations becoming business imperatives, or are they merely token additions on the list of regulatory requirements?
from Dark Reading: https://ift.tt/3jRFKkJ
via IFTTT