Data scraped from 500 million LinkedIn users found for sale online

Data scraped from 500 million LinkedIn users found for sale online

IDs, names, email addresses and more personal details are part of the massive database of stolen data, which could be used to launch additional attacks on LinkedIn and its users. Image: iStockphoto/Suebsiri A massive trove of LinkedIn account data has been found for sale online, containing 500 million user records including email addresses, phone numbers, links to other social media profiles and professional details. Reported by CyberNews researchers, the leak was posted to a forum…

Read More

How poor password habits put your organization at risk

How poor password habits put your organization at risk

More than half of the cyberattacks reported to Keeper Security involved stolen credentials. Image: Getty Images/iStockphoto Cybercriminals use a few key tactics to try to breach an organization’s internal network. One always popular method is to obtain the account credentials of employees. And that endeavor is made easier when employees fail to practice good password hygiene. A report published Tuesday by security provider Keeper Security looks at the pitfalls of mismanaged passwords and offers tips…

Read More

Ransomware Attacks Grew by 485% in 2020

Ransomware Attacks Grew by 485% in 2020

Ransomware attacks increased by an astonishing 485% in 2020 compared to 2019, according to Bitdefender’s 2020 Consumer Threat Landscape Report, which highlighted the ways cyber-criminals targeted the COVID-19 pandemic. Interestingly, nearly two-thirds (64%) of the ransomware attacks took place in the first two quarters of 2020. The report, which analyzed data from Bitdefender’s Global Protective Network (GPN), revealed that proprietary operating systems used in IoT devices made up 96% of all detected vulnerabilities, while a…

Read More

How the quick shift to the cloud has led to more security risks

How the quick shift to the cloud has led to more security risks

Automating cloud security is a process still in its infancy for many organizations, says Unit 42. Image: iStock/Undefined Undefined The coronavirus pandemic forced many organizations to put their cloud migration projects into overdrive. Such a fast and unexpected transition to the cloud inevitably opened the door to more security threats. A report released Tuesday by Palo Alto Networks threat intelligence team Unit 42 examines how the cloud migration has affected security and what organizations can…

Read More

SAP and Onapsis detail findings of potential exploits on unprotected SAP apps

SAP and Onapsis detail findings of potential exploits on unprotected SAP apps

The advanced cyber threat intelligence is aimed at customers who need to protect mission-critical applications, the companies said. Image: istock/structuresxx Eighteen of the world’s 20 major vaccine producers run their production on SAP systems–from manufacturing to controlled distribution to administration and post-vaccine monitoring. Seventy-seven percent of the world’s transaction revenue touches an SAP system. More than 1,000 government and government-owned organizations around the world use SAP software. They are among SAP’s more than 400,000 customers…

Read More

Perimeter 81 launches new Firewall-as-a-Service offering

Perimeter 81 launches new Firewall-as-a-Service offering

The network defense provider joins a growing list of companies offering cloud-based firewalls. Image: iStockphoto/LeoWolfert Secure access service edge (SASE) and network-as-a-service provider Perimeter 81, announced Tuesday a new Firewall-as-a-Service (FWaaS) offering designed to enhance the company’s SASE platform. Perimeter 81’s Network Traffic Control (NTC) offering is aimed at securing the network perimeter and builds upon the company’s SASE offering, which includes its Zero Trust Network Access (ZTNA), Zero Trust Application Access (ZTAA), and DNS…

Read More

Tenable and HCL BigFix Leverage Risk-Based Insights to Speed Vulnerability Remediation Workflows with Strategic Partnership

Tenable and HCL BigFix Leverage Risk-Based Insights to Speed Vulnerability Remediation Workflows with Strategic Partnership

New integration accelerates the vulnerability assessment, prioritization and remediation lifecycle to secure business-critical assets Tenable®, Inc., the Cyber Exposure company, today announced a strategic partnership with HCL BigFix®, a leading endpoint management platform, to bring risk-based insights to the vulnerability remediation lifecycle — from assessment and prioritization to remediation. The partnership launches with a new integration between Tenable.sc™, for vulnerability management on-premises, and HCL BigFix’s Insights for Vulnerability Remediation application, to swiftly identify and correlate…

Read More

G4S acquisition comes to an end; Allied now 7th largest employer in world

G4S acquisition comes to an end; Allied now 7th largest employer in world

G4S acquisition comes to an end; Allied now 7th largest employer in world | 2021-04-06 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie…

Read More

Sophos Links Mount Locker to Astro Locker Ransomware

Sophos Links Mount Locker to Astro Locker Ransomware

Security experts have uncovered a series of close links between ransomware groups Mount Locker and Astro Locker Team, in a new report that will be of interest to incident responders. Sophos’ Managed Threat Response (MTR) team said it recently dealt with an attack that had all the TTPs of a Mount Locker operation. However, when it followed the link in the ransom note, the researchers were met by a ‘support’ team who introduced themselves as “Astro…

Read More

CISA: Patch These Three Fortinet Bugs Now to Avoid Compromise

CISA: Patch These Three Fortinet Bugs Now to Avoid Compromise

The US authorities are urging Fortinet customers to patch three legacy vulnerabilities being exploited in the wild to compromise government, commercial and technology service provider networks. A joint cybersecurity advisory from the FBI and the Cybersecurity and Infrastructure Security Agency (CISA) on Friday warned that threat actors are actively scanning for devices via ports 4443, 8443 and 10443, with the potential end goals of data theft or ransomware deployment. “The FBI and CISA believe the APT actors…

Read More
1 2,324 2,325 2,326 2,327 2,328 2,562