After Gaza ceasefire, MoleRATs hacking group continues to target Middle Eastern governments – CyberScoop

After Gaza ceasefire, MoleRATs hacking group continues to target Middle Eastern governments – CyberScoop

Written by Sean Lyngaas Jun 17, 2021 | CYBERSCOOP Days after Israel and Gaza-based militant group Hamas agreed to a ceasefire in May, Arabic-speaking hackers resumed an effort to break into government networks in the Middle East, according to research published Thursday. The hacking group, known as MoleRATs, sent target organizations a malware-laced PDF claiming to be a report on Hamas members meeting with the Syrian government, security firm Proofpoint said. The malicious code is…

Read More

Australia Suffers Widespread Internet Outage

Australia Suffers Widespread Internet Outage

Australians’ lives were disrupted on Thursday by a widespread internet outage that impacted the country’s mail service and multiple businesses, including banks and airlines. The outage began in the early hours and was caused by a problem at Akamai Technologies, a global content delivery network (CDN) and cybersecurity and cloud service provider.  Akamai, which is based in Cambridge, Massachusetts, has acknowledged the issue, but has not yet disclosed the cause of service disruptions to its hosting platform,…

Read More

Testing to Ensure Your Security Posture Never Slouches | McAfee Blogs

Testing to Ensure Your Security Posture Never Slouches | McAfee Blogs

How well can you predict, prevent and respond to ever-changing cyberthreats? How do you know that your security efforts measure up? The stakes are high if this is difficult to answer and track.  Imagine if you had one place where you found a comprehensive real time security posture that tells you exactly where the looming current cyber risks are and the impact?  Let’s consider a recent and relevant cyber threat. Take, for example, the May…

Read More

Why XDR is Not Enough

Why XDR is Not Enough

By Guy Rosefelt, Security CMO, Sangfor Technologies What is XDR? One of the latest trends in cybersecurity is Extended Detection and Response, more commonly known as XDR.  Although originally defined by Palo Alto Networks as a key capability, other security vendors have released some type of XDR functionality and of course all define and approach it differently.  Gartner defines XDR as “…a unified security incident detection and response platform that automatically collects and correlates data…

Read More

CLOP ransomware suspects charged by police in Ukraine

CLOP ransomware suspects charged by police in Ukraine

Six people alleged to be part of the notorious CLOP ransomware gang have been detained and charged by Ukrainian police, following nearly two dozen raids across the country. According to a statement released by the Ukraine’s cyber police, the hacking group is thought to have inflicted $500 million worth of damage on universities and organisations it exfiltrated data from and infected with ransomware. The arrests are said to be connected to ransomware attacks that took…

Read More

Hackers Can Spy on Peloton Workouts

Hackers Can Spy on Peloton Workouts

Peloton bike users could be spied on while working out, according to new research by McAfee’s Advanced Threat Research team. The team discovered a vulnerability (CVE-2021-3387) in the touchscreen of the $2,495 Bike+ that allows it to be controlled remotely by a threat actor without any interference to the equipment’s operating system. Hackers could exploit the flaw to install malicious apps that spoof Netflix or Spotify to steal personal details and login credentials.  Researchers also found that the…

Read More

LORCA Announces New Intensive Program for Most Promising Cyber Startups

LORCA Announces New Intensive Program for Most Promising Cyber Startups

The London Office for Rapid Cybersecurity Advancement (LORCA) has launched a new initiative designed to propel the growth of UK cyber startups. LORCA Ignite will see six of the most successful companies that have graduated from the LORCA accelerator program during the past three years participate in a new, intensive program, which will help them achieve rapid scale and commercial growth. LORCA is a government-backed initiative that started in 2018 to accelerate the growth of UK cyber startups….

Read More

REvil ransomware gang hit US nuclear weapons contractor Sol Oriens

REvil ransomware gang hit US nuclear weapons contractor Sol Oriens

The REvil ransomware gang made the headlines again, the group hit the US nuclear weapons contractor Sol Oriens and stole the victim’s data. US nuclear weapons contractor Sol Oriens was hit by a cyberattack carried out by the REvil ransomware operators, which claims to have stolen data. Sol Orien provides consultant services to the National Nuclear Security Administration (NNSA), it confirmed to have suffered a cyber attack via Twitter. Sol Oriens statement to us now: “In May…

Read More

VMware NSX Advanced Firewall for VMware Cloud on AWS – VMware Cloud Community

VMware NSX Advanced Firewall for VMware Cloud on AWS – VMware Cloud Community

We are pleased to announce a major expansion of VMware Cloud on AWS Network Security portfolio with the introduction of VMware NSX Advanced Firewall add-on. As you migrate and modernize your applications on the cloud, NSX Advanced Firewall capabilities help you secure your applications against a never-expanding set of threats on the internet. Now you can: Detect attempts at exploiting vulnerabilities in your workloads. Gain protection against vulnerabilities inside your SDDC with granular application-level security…

Read More

Father’s Day Gift Ideas: Protecting the Tech You Give to Dad

Father’s Day Gift Ideas: Protecting the Tech You Give to Dad

A new piece of tech often tops the list of Father’s Day gifts. And while things such as wearable fitness devices, smart speakers, smart outlets, or any number of other connected gadgets and do-dads are popular picks, one thing often gets overlooked—protecting those devices from hacks and attacks.  We live in a day and age when even connected lightbulbs can be hacked. The reality is that gift-worthy tech like home cameras, speakers, and other Internet of Things (IoT) devices can fall prey to bad actors. The reason why is relatively straightforward….

Read More
1 2,222 2,223 2,224 2,225 2,226 2,583