Steris Touted as Latest Accellion Hack Victim

Steris Touted as Latest Accellion Hack Victim

Data belonging to a client of recently hacked California-based private cloud solutions company Accellion is being advertised for sale online by cyber-criminals. On the website Clop Leaks, ransomware gang Clop are claiming to have in their possession an unspecified amount of information belonging to the Steris Corporation. Steris is an American Ireland-registered medical equipment company specializing in sterilization and surgical products for the US healthcare system.  Documents that appear to have been stolen include a confidential report about…

Read More

North Korean hackers find another new target: The defense industry

North Korean hackers find another new target: The defense industry

The Lazarus group had a busy 2020, and 2021 is shaping up to be another devastatingly productive year for one of the most dangerous hacking groups on the planet. Image: BeeBright, Getty Images/iStockphoto Kaspersky security researchers have found evidence that the North Korean hacking collective known as Lazarus has added another target to its list of victims: The defense industry, and companies in more than a dozen countries have already been affected. As previously reported…

Read More

Iraqi MP Suffers Online Extortion

Iraqi MP Suffers Online Extortion

A senior Iraqi politician has become the victim of a prolonged international campaign of intimidation and online extortion. In dual raids carried out on February 24, police in Australia and Canada arrested four individuals accused of targeting the politician and his family for over a year.  While the identity of the victim has not been officially disclosed, Australian police described him as a “very senior politician” who has dual Australian and Iraqi citizenship and who…

Read More

VMware patches bug that put many large networks at risk

VMware patches bug that put many large networks at risk

The now-patched vulnerability could have allowed attackers to scan a company’s internal network and gain access to sensitive data, says Positive Technologies. iStock/weerapatkiatdumrong VMware has fixed a serious flaw in its vCenter Server VMware utility that could have opened the door for hackers to remotely execute code on a vulnerable server. In a press release published Wednesday, Positive Technologies, which discovered and alerted VMware to the bug, said attackers could have exploited the vCenter Server…

Read More

Kubernetes is Just Another Thing to Manage – VMware Cloud Community

Kubernetes is Just Another Thing to Manage – VMware Cloud Community

Kubernetes is something that has now become a commodity within Cloud Operations. Cloud Operations more and more becomes responsible for delivering and managing the Kubernetes stack as-a-service. This blog shows which capabilities need to be addressed for Kubernetes delivery.   If you are living in IT, you know by now that containers are an easy way to deliver applications. This has been one of the key reasons behind the rapid adoption of containers by developers….

Read More

SOC Health Check: Prescribing XDR for Enterprises  | McAfee Blogs

SOC Health Check: Prescribing XDR for Enterprises  | McAfee Blogs

It is near-certain the need for security across the enterprise will never cease – only increase if year-over-year trends are any indication. We constantly see headlines with repetitive buzzwords and phrases calling attention to the complexity of today’s security operations center (SOC) with calls to action to reimagine and modernize the SOC. We’re no different here at McAfee in believing this to be true.    In order for this to happen, however, we need to update our thinking when…

Read More

Security concerns arise over popular Clubhouse app after ties to China-based company revealed

Security concerns arise over popular Clubhouse app after ties to China-based company revealed

The Stanford Internet Observatory alleged that the Chinese government may have had access to audio data from Clubhouse. Here’s what users should know. Getty Images/iStockphoto Concerns have been raised about the security of audio data on the popular new social media app Clubhouse, according to reports from the Stanford Internet Observatory and McAfee’s Advanced Threat Research team.  Stanford’s Cyber Policy Center confirmed on Feb. 12 that tools from Shanghai-based company Agora were serving as the…

Read More

Educational Adaptation Required to Close the Cyber-Skills Gap

Educational Adaptation Required to Close the Cyber-Skills Gap

Addressing the cyber-skills gap requires a variety of career pathways and greater collaboration between governments, academia and industry, according to experts speaking during a webinar entitled Closing The Cyber Skills Gap: Can We Make a Difference? This session involved security vendor Palo Alto Networks and academics, government members and security experts from Scotland, and took place during CyberScotland week. First and foremost, a strong cybersecurity awareness and culture throughout society needs to be built. This includes…

Read More

Airplane manufacturer Bombardier has disclosed a security breach, data leaked online

Airplane manufacturer Bombardier has disclosed a security breach, data leaked online

Hackers posted data stolen from manufacturer of business jets Bombardier on Clop ransomware leak site following alleged FTA hack. Hackers exploited vulnerabilities in Accellion FTA file-sharing legacy servers to steal data from the airplane maker Bombardier and leak data on the site operated by the Clop ransomware gang. The wave of attacks exploiting multiple zero-day vulnerabilities in the Accellion File Transfer Appliance (FTA) software began in mid-December 2020, threat actors use to deploy a shell…

Read More

5 minutes with Shimrit Tzur-David – Developments in passwordless authentication technology

5 minutes with Shimrit Tzur-David – Developments in passwordless authentication technology

5 minutes with Shimrit Tzur-David – Developments in passwordless authentication technology | 2021-02-25 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to…

Read More
1 2,384 2,385 2,386 2,387 2,388 2,554