Data breach of NFT marketplace OpenSea may expose customers to phishing attacks

Data breach of NFT marketplace OpenSea may expose customers to phishing attacks

Triggered by an employee from an external vendor who shared email addresses with an unauthorized party, the breach could lead to phishing attempts against affected individuals. Image: Proxima Studio/Adobe Stock NFT giant OpenSea is warning of a data breach that exposed the email addresses of users and subscribers to the company’s newsletter. In a notice published Wednesday, OpenSea revealed that anyone who shared their email address with the company in the past should assume that…

Read More

Microsoft Spots Updated Cryptomining Malware Tool Targeting Linux Systems

Microsoft Spots Updated Cryptomining Malware Tool Targeting Linux Systems

Microsoft’s Security Intelligence team has issued a new warning against a known cloud threat actor (TA) group. Tracked as 8220 and active since early 2017, the group would have now updated its malware toolset to breach Linux servers in order to install crypto miners as part of a long-running campaign. “The updates include the deployment of new versions of a cryptominer and an IRC bot, as well the use of an exploit for a recently…

Read More

New ‘SessionManager’ Backdoor Targeting Microsoft Exchange Servers Worldwide

New ‘SessionManager’ Backdoor Targeting Microsoft Exchange Servers Worldwide

Kaspersky security experts have discovered new malware targeting Microsoft Exchange servers belonging to several organizations worldwide. Dubbed “SessionManager” and first spotted by the company in early 2022, the backdoor enables threat actors to keep “persistent, update-resistant and rather stealth access to the IT infrastructure of a targeted organization.” According to Kaspersky, once propagated, SessionManager would enable a wide range of malicious activities, from collecting emails to complete control over the victim’s infrastructure.  The analyses by the…

Read More

Threat Actor Claims Responsibility For IBM and Stanford University Hack

Threat Actor Claims Responsibility For IBM and Stanford University Hack

CloudSEK used its artificial intelligence (AI)-powered digital risk platform XVigil to identify a post on a cybercrime forum mentioning open source automation server platform Jenkins as one of the TTP (tactics, techniques, and procedures) used by a threat actor (TA) in attacks against IBM and Stanford University. The module reportedly has hidden desktop takeover capabilities that would be used by the TA to get clicks on ads.  The post on the English-speaking forum was spotted by CloudSEK on…

Read More

Tips to bolster cybersecurity, incident response this 4th of July weekend

Tips to bolster cybersecurity, incident response this 4th of July weekend

<!– Tips to bolster cybersecurity, incident response this 4th of July weekend | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn…

Read More

The Total Economic Impact of Cisco Lifecycle Advantage

The Total Economic Impact of Cisco Lifecycle Advantage

Technology has long made an impact on the world we live in. Smartphones give us access to information almost immediately; social networking makes it easy for us to stay connected with family and friends and work remotely; and, as I mentioned in my last blog, electric cars make it way more fun to get around. The impact of new programs and processes using technology is far reaching and visible in our day-to-day actions with colleagues,…

Read More

Trust Key to Space Travel, Like Cybersecurity, Says Astronaut Tim Peake

Trust Key to Space Travel, Like Cybersecurity, Says Astronaut Tim Peake

Astronaut Tim Peake emphasized the importance of trust in space travel and highlighted a number of principles in his field that can be applied to cybersecurity, during a recent talk at the Okta Forum 2022 event in London, UK. Peake described several perilous situations he has experienced in his career working in space, including a colleague nearly drowning while out on a spacewalk due to leakage caused by a broken fan pump separator. Preventing such scenarios from…

Read More

Video management system secures global biopharmaceutical company

Video management system secures global biopharmaceutical company

<!– Video management system secures global biopharmaceutical company | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website…

Read More

Jon Raper named CISO at Costco

Jon Raper named CISO at Costco

<!– Jon Raper named CISO at Costco | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses…

Read More

Today’s high speed optical links would fail if not for this technology (Part 2)

Today’s high speed optical links would fail if not for this technology (Part 2)

Written by Vasanta Rao, Technical Marketing Engineer, Transceiver Modules Group (Cisco Optics) Understanding FEC Part 2: The Trade-Offs of Using FEC In part two of this two-part blog post, we discuss the trade-offs and performance impact of forward error correction (FEC) on the network. Part one reviewed the basics of this essential technology. Applications like social media, streaming video, the Internet of things and the pervasiveness of cloud computing are all contributing to skyrocketing bandwidth…

Read More
1 2,869 2,870 2,871 2,872 2,873 4,073