What Pandemic Responses Teach Us About Cybersecurity

What Pandemic Responses Teach Us About Cybersecurity

I’ve been working at Tripwire for over two decades, and I’ve acquired a fair bit of swag over those years: branded jackets, hats, shoes, a watch, and of course a drawer full of t-shirts. One thing I never would have predicted owning was a Tripwire-branded face mask to protect me from a global pandemic. Over the past year, I’ve worn that face mask more than any of my other swag. Of course, none of my…

Read More

The Journey into Cybersecurity: Movies, Military, and Dance Parties

The Journey into Cybersecurity: Movies, Military, and Dance Parties

Cybersecurity is one of the fastest-growing fields, not just in computer science but arguably in all industries. What is even more fascinating is that no matter how many newly trained cybersecurity professionals emerge each day, there is still a need for many more. The industry is in dire need of people, not only with the knowledge but also with the passion to make the cyber-world a safer place for everyone. What Makes Cybersecurity So Attractive? It is…

Read More

Apple iCloud Hacker Steals Nudes

Apple iCloud Hacker Steals Nudes

A 40-year-old man from California has admitted his role in a conspiracy to break into the private digital photo libraries of Apple customers to locate and steal sexually explicit images. Hao Kuo Chi, a resident of the city of La Puenta in Los Angeles County, pleaded guilty to charges of computer fraud and conspiracy on Friday, October 15.  According to documents submitted to a court in Tampa, Florida, Chi conspired with other unknown individuals to gain unauthorized…

Read More

Why NDR? See the Entire Elephant in the Room

Why NDR? See the Entire Elephant in the Room

By Aimei Wei, Chief Technical Officer (CTO) and Founder Network detection and response (NDR) has a long history, evolving out of network security and network traffic analysis (NTA). The historical definition of network security is to use a perimeter firewall and Intrusion Prevention System (IPS) to screen traffic coming into the network, but as IT technology and security technology have evolved due to modern attacks leveraging more complex approaches, the definition is much broader now….

Read More

Sinclair TV stations downtime allegedly caused by a ransomware attack

Sinclair TV stations downtime allegedly caused by a ransomware attack

A ransomware attack is likely the cause of the recent downtime for TV stations owned by the Sinclair Broadcast Group broadcast television company. TV stations owned by the Sinclair Broadcast Group went down over the weekend officially due to technical issues, but some media [1,2] reported that it was a victim of a ransomware attack. The alleged attack compromised the Sinclair internal corporate network, the broadcasting systems of TV stations, email servers, and phone services…

Read More

Prison for UPMC Data Thief

Prison for UPMC Data Thief

A hacker from Michigan who stole and sold the sensitive data of tens of thousands of University of Pittsburgh Medical Center (UPMC) employees has been sent to prison.  Former Federal Emergency Management Agency (FEMA) IT specialist Justin Sean Johnson pleaded guilty on May 20 to counts 1 and 39 of a 43-count indictment. The court heard that the 30-year-old former resident of Detroit admitted infiltrating and hacking into the UPMC’s human resources server database in 2013 and…

Read More

Forensic Collections From a Mac: CHALLENG ES & SOLUTIONS

Forensic Collections From a Mac: CHALLENG  ES & SOLUTIONS

INTRODUCTION For law enforcement, finding and dealing with Apple devices in the field can create confusion and headaches without first understanding some critical differences between Operating systems (HFS+, APFS and Windows file systems). With digital forensic professionals seeing more Mac laptops and other Apple devices more often, we created this guide to identify a few challenges that law enforcement and digital investigators may encounter and provide solutions and best practices for tackling these obstacles both…

Read More

Data Breach Hits US Dental Patients

Data Breach Hits US Dental Patients

A cyber-attack on the vendor of a network of dental practices may have exposed the data of tens of thousands of patients.  A cyber-criminal used a phishing attack to gain access to the computer systems of North American Dental Management between March 31 and April 1, 2021. Pittsburgh-based North American Dental Management provides administrative and technology support services for Professional Dental Alliance (PDA) offices. Following the security breach, PDA notified patients that an unauthorized individual may have…

Read More

Trickbot spreads malware through new distribution channels

Trickbot spreads malware through new distribution channels

TrickBot operators are back and expand the distribution channels with partnership with cybercrime affiliates. The operators behind the infamous TrickBot (ITG23 and Wizard Spider) malware have resurfaced with new distribution channels to deliver malicious payloads, such as Conti ransomware. The gang support other cybercrime groups such as known Hive0105, Hive0106 (aka TA551 or Shathak), and Hive0107, supporting them in expanding their malware campaigns. “As of mid-2021, X-Force observed ITG23 partner with two additional malware distribution…

Read More

Tech support scams top list of latest phishing threats

Tech support scams top list of latest phishing threats

Tech support scams work because they try to trick people into believing there’s a serious security crisis with their computers, says Norton Labs. Image: Bojan89, Getty Images/iStockphoto You receive a phone call, an email or a popup on the web claiming that your computer is at risk and that some security firm or product is needed to fix the problem. Though such scams seem obvious to people knowledgeable about cyber threats, many people still fall…

Read More
1 2,198 2,199 2,200 2,201 2,202 2,757