ProxyLogon Microsoft Exchange exploit is completely out of the bag by now

ProxyLogon Microsoft Exchange exploit is completely out of the bag by now

A security researcher released a new PoC exploit for ProxyLogon issues that could be adapted to install web shells on vulnerable Microsoft Exchange servers. A security researcher has released a new proof-of-concept exploit that could be adapted to install web shells on Microsoft Exchange servers vulnerable ProxyLogon issues. Since the disclosure of the flaw, security experts observed a surge in the attacks against Microsoft Exchange mailservers worldwide. Check Point Research team reported that that in…

Read More

Closing the Cybersecurity Skills Gap: SOAR with definitive evidence

Closing the Cybersecurity Skills Gap: SOAR with definitive evidence

By Michael Morris, Director of Global Business Development, Endace We’ve all read the news and seen the stats, so it comes as no surprise that SecOps teams are incredibly short-staffed and there is no quick fix. But the actual numbers are quite staggering: more than four million professionals are needed worldwide to close the cybersecurity skills gap, and that number is expected to increase exponentially in years to come ((ISC)2 Research, Nov 2019). SecOps and…

Read More

Fastway Couriers Confirms Security Breach

Fastway Couriers Confirms Security Breach

A globally franchised courier company has issued a notice confirming that it was the subject of a cyber-attack. The assault on Fastway Couriers was discovered by one of the company’s third-party IT development contractors on February 25.  In a security notice issued March 11, Fastway Couriers confirmed that a cyber-attack had occurred and that it had resulted in a data breach. “Fastway Couriers confirms that one of its IT systems has been subject of a cyber-attack, the consequence of…

Read More

Mamma Mia! Compromised passwords are filled with popular music artists

Mamma Mia! Compromised passwords are filled with popular music artists

All apologies, but if you use your favorite band as part of your password it’s time to turn around and try something else. Image: iStock/Cesare Ferrari In honor of the 2021 Grammys, Specops Software has released a new analysis of over 800 million breached passwords to find which best-selling music artists are most frequently included. Topping the list? It’s R.E.M. The list pulled any entry in Specops’ compromised password database that contained an artist or…

Read More

McAfee uncovers espionage campaign aimed at major telecommunication companies

McAfee uncovers espionage campaign aimed at major telecommunication companies

The security company said the attacks were attributed to RedDelta and Mustang Panda, both of which are allegedly based in China. Image: iStockphoto/Gangis_Khan The McAfee Advanced Threat Research Strategic Intelligence team has identified an espionage campaign that is specifically targeting telecommunication companies in an attack dubbed “Operation Diànxùn.” McAfee researchers Thomas Roccia, Thibault Seret and John Fokker said in a blog post that the malware is using tactics similar to those seen from groups like…

Read More

Spanish Data Protection Agency Issues Highest Ever Fine

Spanish Data Protection Agency Issues Highest Ever Fine

Vodafone Spain has been hit with the highest ever fine to be issued by the Spanish Data Protection Agency (AEPD). The telecommunications company was financially penalized in four separate fines totaling $9.72m over its use of aggressive telemarketing tactics and its failure to protect data.  Two of the fines, which together total $7.16m, relate to the EU’s General Data Protection Regulation (GDPR) violations. A third, for $2.39m, cited Spanish laws on digital rights and telecommunications as well…

Read More

UK Nurseries Get First Official Cyber-Attack Warning

UK Nurseries Get First Official Cyber-Attack Warning

The UK’s National Cyber Security Centre (NCSC) has issued its first ever cybersecurity warning to nurseries and childminders. The agency, which is part of the nation’s GCHQ intelligence service, said that the education sector’s increasing reliance on technology has made it an “appealing target” for cyber-criminals.  In a new set of guidelines published online, the NCSC warns early years practitioners that part of safeguarding the children in their care is making sure that sensitive data belonging to…

Read More

99.2% of US government Android users are running outdated OS versions

99.2% of US government Android users are running outdated OS versions

Some versions of Android in use by government employees go all the way back to 2017’s Android 8, and that’s a huge cybersecurity problem. Tero Vesalainen, Getty Images/iStockphoto Android, the most popular mobile operating system in the world, runs on plenty of devices used by U.S. government workers, but only 0.08% of those devices are running the latest version of Android, a report finds. Mobile security firm Lookout is behind the report, which looked at…

Read More

An Intelligence-Driven Approach to Extended Detection and Response (XDR)

An Intelligence-Driven Approach to Extended Detection and Response (XDR)

Threat detection isn’t getting any easier. Today’s threat actors are escalating the number of attacks they launch, going after more targets, using increasingly sophisticated techniques, and achieving their goals through surreptitiousness – not notoriety. With more than 2,000 security vendors catalogued and organizations reporting an average of 45 security solutions deployed, why aren’t we any closer to solving the threat detection gap? To answer this question, we first need to ask, what are we trying…

Read More
1 2,354 2,355 2,356 2,357 2,358 2,557