CyberNews researchers discovered that many universities worldwide are leaking sensitive information and are even open to full takeover. Many universities worldwide, including some of the most prestigious, leave their webpages unpatched, leaking sensitive information, and even open to full takeovers,…
Viva Air – 932,232 breached accounts
In March 2022, the now defunct Columbian airline Viva Air suffered a data breach and subsequent ransomware attack. Among a trove of other ransomed data, the incident exposed a log of 2.6M transactions with 932k unique email addresses, physical and…
Software developers, how secure is your software?
EFF Welcomes Erica Astrella and Yoshi Kohno to Its Board of Directors
Astrella and Kohno Bring Wealth of Experience in Diversity, Equity, Inclusion, Security Research and Data Privacy SAN FRANCISCO—The Electronic Frontier Foundation (EFF) is honored to announce today that Erica Astrella, Head of Technology at Parkwood Entertainment and a leading voice…
What is digital domestic abuse?
Understanding digital domestic abuse and what you can do if you’re a victim. The post What is digital domestic abuse? appeared first on Panda Security Mediacenter. This article has been indexed from Panda Security Mediacenter Read the original article: What…
Hackers Exploit Zero-Day Flaw in Software Used by Resorts and Hotels
In the evolving hospitality industry landscape, where vacation rental software has transitioned from luxury to necessity, a growing concern emerges regarding cybersecurity. This software, while primarily simplifying booking, guest interactions, and property management, stores sensitive data such as credit card…
New HijackLoader Modular Malware Loader Making Waves in the Cybercrime World
A new malware loader called HijackLoader is gaining traction among the cybercriminal community to deliver various payloads such as DanaBot, SystemBC, and RedLine Stealer. “Even though HijackLoader does not contain advanced features, it is capable of using a variety of modules for code…
Evil Telegram campaign: Trojanized Telegram apps found on Google Play
Evil Telegram: a Trojanized version of the Telegram app was spotted on the Google Play Store, Kaspersky researchers reported. Researchers from Kaspersky discovered several Telegram mods on the Google Play Store that contained spyware, the campaign was tracked as Evil…
The blueprint for a highly effective EASM solution
In this Help Net Security interview, Adrien Petit, CEO at Uncovery, discusses the benefits that organizations can derive from implementing external attack surface management (EASM) solutions, the essential capabilities an EASM solution should possess, and how it deals with uncovering…
CISOs and board members work more closely than ever before
73% of board members believe they face the risk of a major cyber attack in the next 12 months, a notable increase from 65% in 2022, according to Proofpoint. Likewise, 53% feel unprepared to cope with a targeted attack, up…
Elevating API security to reinforce cyber defense
While APIs are essential to many operations and used extensively, a lack of prioritization and understanding is leading us towards a growing API security crisis, according to a report by Traceable AI and Ponemon Institute. The urgency for API security…
Email forwarding flaws enable attackers to impersonate high-profile domains
Sending an email with a forged address is easier than previously thought, due to flaws in the process that allows email forwarding, according to a research team led by computer scientists at the University of California San Diego. The issues…
Empowering consumer privacy with network security
Every online interaction hinges on the bedrock of network security. With cyber threats and data breaches making headlines daily, businesses must understand how network security safeguards consumer privacy. In this Help Net Security video, Shawn Edwards, CSO at Zayo Group,…
Understanding the dangers of social engineering
Social engineering is a manipulative technique used by individuals or groups to deceive or manipulate others into divulging confidential or sensitive information, performing actions, or making decisions that are not in their best interest. It often involves exploiting human psychology…
Google warns infoseccers: Beware of North Korean spies sliding into your DMs
ALSO: Verizon turns self in for reduced fine, malvertising comes to macOS, and this week’s critical vulnerabilities In brief Watch out, cyber security researchers: Suspected North Korean-backed hackers are targeting members of the infosec community again, according to Google’s Threat…
Chrome’s “Enhanced Ad Privacy”: What you need to know
Categories: Personal Tags: google Tags: chrome Tags: website Tags: API Tags: Topics Tags: tracking Tags: ads Tags: adverts Tags: cookies We take a look at a Chrome popup related to Topics API, which you may be seeing in the near…
IT Security News Weekly Summary – Week 36
IT Security News Daily Summary 2023-09-10 Powerful Ethnic Militia in Myanmar Repatriates 1,200 Chinese Suspected of Involvement in Cybercrime Microsoft and Google’s Approach to Replace Obsolete TLS Protocols Rhysida Ransomware gang claims to have hacked three more US hospitals New…
IT Security News Daily Summary 2023-09-10
Powerful Ethnic Militia in Myanmar Repatriates 1,200 Chinese Suspected of Involvement in Cybercrime Microsoft and Google’s Approach to Replace Obsolete TLS Protocols Rhysida Ransomware gang claims to have hacked three more US hospitals New York’s Geofencing Ban: A Game Changer…
Powerful Ethnic Militia in Myanmar Repatriates 1,200 Chinese Suspected of Involvement in Cybercrime
One of Myanmar’s biggest and most powerful ethnic minority militias arrested and repatriated more than 1,200 Chinese nationals allegedly involved in criminal online scam operations. The post Powerful Ethnic Militia in Myanmar Repatriates 1,200 Chinese Suspected of Involvement in Cybercrime…
Microsoft and Google’s Approach to Replace Obsolete TLS Protocols
Tech behemoths Microsoft and Google have teamed up to phase out outmoded TLS (Transport Layer Security) protocols in a decisive drive to strengthen online security. TLS protocols are essential for protecting internet connections because they guarantee that data is kept…
Rhysida Ransomware gang claims to have hacked three more US hospitals
Rhysida Ransomware group added three more US hospitals to the list of victims on its Tor leak site after the PROSPECT MEDICAL attack. Recently the Rhysida ransomware group made the headlines because it announced the hack of Prospect Medical Holdings…
New York’s Geofencing Ban: A Game Changer for Advertisers
The New Law on Geofencing New York has recently passed a new provision in its state budget that prohibits advertisers from geofencing healthcare facilities. This law, which was passed in May, has made it increasingly difficult for advertisers who want…
Mirai Botnet Variant ‘Pandora’ Hijacks Android TVs
Pandora, a variant of the Mirai botnet, has been identified targeting budget-friendly Android-based television sets and TV boxes. It utilizes these devices as part of a botnet to execute distributed denial-of-service (DDoS) attacks. Mirai is a type of harmful…
Johnson & Johnson Reveals: IBM Data Breach Compromised Customer Data
Johnson & Johnson Health Care Systems (Janssen) recently informed their CarePath customers of a third-party data breach involving IBM, that has resulted in the compromise of their sensitive information. IBM is a technology service provider for Janssen. In particular, it…