Hackers update Gootkit RAT to use Google searches and discussion forums to deliver malware

Hackers update Gootkit RAT to use Google searches and discussion forums to deliver malware

Security analysts and an SEO expert explain how this new approach uses legitimate websites to trick users into downloading infected files. computer safety concept, trojan horse in electronic environment.computer safety concept, trojan horse in electronic environment. the-lightwriter, Getty Images/iStockphoto It was only a matter of time before cybercriminals turned their attention to one of the most common activities on the internet— a Google search. The latest trick is using long-tail search terms and legitimate websites…

Read More

Another 210,000 Americans Affected by Netgain Ransomware Attack

Another 210,000 Americans Affected by Netgain Ransomware Attack

The number of Americans affected by a cyber-attack on a cloud hosting and IT services provider has increased by 210,000. Netgain Technologies LLC, in St. Cloud, Minnesota, was forced to take some of its data centers offline after falling victim to a ransomware attack on November 23 last year. A few days after the attack, customers were emailed warnings that system outages or slowdowns may occur.  The company provides services to several organizations in the healthcare and accounting industries,…

Read More

Apple fixes CVE-2021-1844 RCE that affects iOS, macOS, watchOS, and Safari

Apple fixes CVE-2021-1844 RCE that affects iOS, macOS, watchOS, and Safari

Apple released out-of-band patches to address a remote code execution, tracked as CVE-2021-1844, that affect iOS, macOS, watchOS, and Safari web browser. Apple has released out-of-band security patches to address a critical iOS, macOS, watchOS, and Safari web browser to address a security flaw tracked as CVE-2021-1844. The vulnerability was discovered by Clément Lecigne of Google’s Threat Analysis Group and Alison Huffman of Microsoft Browser Vulnerability Research. The flaw could be exploited by remote attackers…

Read More

Hackers attempt to poison the well, but AI cybersecurity solutions bolster water treatment facility security

Hackers attempt to poison the well, but AI cybersecurity solutions bolster water treatment facility security

After a breach at a Florida treatment facility, tap water security is front and center. In the digital age, there are no shortages of challenges in the pipeline between facility and spigot. Image: iStock/tuachanwatthana After a cyberattack on a Florida treatment facility, conversations surrounding tap water security are front and center for IT teams and H2O-quaffing humans alike. Around the U.S., artificial intelligence-enabled autonomous systems are providing round-the-clock monitoring and response for short-handed IT teams…

Read More

Introducing: Modernizing Infrastructure with VMware Cloud on AWS – VMware Cloud Community

Introducing: Modernizing Infrastructure with VMware Cloud on AWS – VMware Cloud Community

They say a book should only be released as a second edition if there is substantial change to the content. Here it is, ‘Modernizing Infrastructure with VMware Cloud on AWS™’, Second Edition. The aim has been to pack this book with real-world proven strategies and make it the perfect pocket guide for deploying a new SDDC on VMware Cloud on AWS™ or transforming an existing infrastructure in a new way. VMware Cloud on AWS™ has…

Read More

Trans Tracking Plugin Reported to Norwegian Authorities

Trans Tracking Plugin Reported to Norwegian Authorities

A plugin that flags social network pages and users as transphobic or trans-friendly has been reported to Norwegian authorities over concerns that it is in violation of data protection laws. Shinigami Eyes uses a color-coding system to denote the attitude of a site or a user toward the trans community. The extension turns green to denote a trans-friendly site or user and red when that site or user is considered anti-trans.  A mix of manual labeling, user…

Read More

A new Linux Foundation open source signing tool could make secure software supply chains universal

A new Linux Foundation open source signing tool could make secure software supply chains universal

Sigstore could eliminate the headaches associated with current software signing technology through public ledgers. The Linux Foundation, in partnership with Red Hat, Google and Purdue University, has announced a new digital signing project, potentially eliminating many of the headaches that come with securing open source software, files, images and binaries.  Called sigstore, the new cryptographic signing platform uses public logging similar to (but not the same as) cryptocurrencies and other blockchain technologies, the end result…

Read More

Criminals arrested after trusting encrypted chat app cracked by police

Criminals arrested after trusting encrypted chat app cracked by police

Police in the Netherlands and Belgium have made hundreds of raids, and arrested at least 80 people, after cracking into an encrypted phone network used by organised criminals. In a press release, Europol said that crime-fighting authorities in France, Belgium and the Netherlands had not only arrested a large number of suspected criminals, but also shut down the SKY ECC communication platform. According to Europol, authorities have been able to monitor “the information flow of…

Read More

Sumo Logic Agrees Deal to Acquire DFLabs

Sumo Logic Agrees Deal to Acquire DFLabs

Security event management company Sumo Logic has announced it has reached an agreement to acquire DF Labs S.p.A. The deal will allow Sumo Logic to incorporate DFLabs’ security orchestration, automation and response (SOAR) software into its cloud-native SIEM solution. Sumo Logic said these new capabilities are especially important amid the rapid digital transformation taking place across organizations since the start of the COVID-19 pandemic. This includes increased cloud adoption and the shift to remote working….

Read More

Ajay Sabhlok Appointed Rubrik’s First Joint CIO and CDO

Ajay Sabhlok Appointed Rubrik’s First Joint CIO and CDO

Cloud data management company Rubrik has announced the appointment of Ajay Sabhlok to the dual role of Chief Information Officer (CIO) and Chief Data Officer (CDO). Sabhlok has more than 10 years of experience in the technology industry and first joined Rubrik as VP and head of IT enterprise business applications in 2018, developing its IT applications and architecture functions. Prior to that, he oversaw various IT application portfolios at VMware including business intelligence, advanced…

Read More
1 2,523 2,524 2,525 2,526 2,527 2,718