-
+30 +1
I’ve Dealt With Foreign Cyberattacks. America Isn’t Ready for What’s Coming.
U.S. leaders must rethink the current cyberdefense system and rally around a centralized regulator.
-
+20 +1
Hackers Leak Entire Donor History of Every GiveSendGo Campaign
The leak appears to contain the personal information of everyone who donated to causes like the Canadian “freedom convoy” and Kyle Rittenhouse’s legal defense.
-
+27 +1
Apple macOS Big Sur 11.6.4 update released with security fixes and solves battery drain issue
Cupertino based tech giant Apple has released macOS 11.6.4 update to macOS Big Sur that contains security fixes, as well as a macOS Catalina Security Update. According to Apple's release notes for the update, macOS Big Sur 11.6.4 "improves the security of macOS" and is recommended for all users.
-
+26 +1
iOS 15 Patched Security Hole That Potentially Exposed Users' Private Apple ID Information to Third-Party Apps
Apple patched two significant security vulnerabilities when it released iOS 15 that could have potentially exposed users' private Apple ID information and in-app search history to malicious third-party apps and allowed apps to override user Privacy preferences, Apple has revealed in a recent support document update.
-
+1 +1
MacBook Pro design hackers REvil all arrested, say Russian authorities
Ransomware operations by the MacBook Pro design hackers REvil have been shut down, according to a statement by Russian authorities today, with all remaining members arrested. It follows an arrest and seizure of funds late last year, after the group unsuccessfully attempted to blackmail Apple …
-
+22 +1
How to recover when your Facebook account is hacked
Here’s how to prevent (and recover from) a Facebook hack.
-
+21 +1
The Log4J Vulnerability Will Haunt the Internet for Years
A VULNERABILITY IN the open source Apache logging library Log4j sent system administrators and security professionals scrambling over the weekend. Known as Log4Shell, the flaw is exposing some of the world's most popular applications and services to attack, and the outlook hasn't improved since the vulnerability came to light on Thursday. If anything, it's now excruciatingly clear that Log4Shell will continue to wreak havoc across the internet for years to come.
-
+22 +1
Sensitive information of 30k Florida healthcare workers exposed in unprotected database | ZDNet
Ethical hackers discovered the names, addresses, social security numbers and tax information for more than 30,000 healthcare workers in a database run by Gale Healthcare Solutions.
-
+24 +1
Hackers Are Breaking into Cloud Accounts to Mine Crypto: Google
A Google Threat Horizon Report published earlier this week has raised concerns over hacked cloud accounts being used to mine cryptocurrency. “Malicious actors were observed performing cryptocurrency mining within compromised Cloud instances,” the report said. It added that of 50 recent examples, 86% of cases showed that hackers were mining cryptocurrencies with the accounts.
-
+3 +1
Wind turbine giant Vestas' data compromised in cyberattack
Vestas Wind Systems, a leader in wind turbine manufacturing, has shut down its IT systems after suffering a cyberattack.
-
+17 +1
Top 4 insecure standards we can't easily abandon
Why would people continue to use methods known to be insecure? It's mostly a matter of their widespread use and inertia.
-
+15 +1
Apple silently fixes iOS zero-day, asks bug reporter to keep quiet
Apple has silently fixed a gamed zero-day vulnerability with the release of iOS 15.0.2, on Monday, a security flaw that could let attackers gain access to sensitive user information.
-
+24 +1
Twitch confirms major data breach after its source code and secrets leak out
Twitch creator payouts and internal tools were leaked earlier today
-
+43 +1
Ransomware gangs are complaining that other crooks are stealing their ransoms | ZDNet
Ransomware gangs are shocked to find out that cyber crooks will scam other criminals if they can.
-
+13 +1
Most Business Owners do not Disclose Cyberattacks
A recent study shows that remote working still poses a significant cybersecurity risk and that business owners prefer to hide cybersecurity incidents.
-
+16 +1
Paying Hackers’ Ransom Demands Is Getting Harder
If your data center's ransomware recovery plan is to pay off the hackers with cryptocurrency, it's time to rethink your strategy as regulators crack down. Today, every data center manager should be aware of the dangers of ransomware and have a disaster recovery plan that doesn't involve paying hackers’ ransomware demands.
-
+27 +1
Let's Encrypt's Root Certificate is About To Expire, and It Might Break Your Devices
One of the largest providers of HTTPS certificates, Let's Encrypt, will stop using an older root certificate next week -- meaning you might need to upgrade your devices to prevent them from breaking. From a report: Let's Encrypt, a free-to-use nonprofit, issues certificates that encrypt the connecti...
-
+2 +1
Why Ransomware Hackers Love a Holiday Weekend
On the Friday heading into Memorial Day weekend this year, it was meat processing giant JBS. On the Friday before the Fourth of July, it was IT management software company Kaseya and, by extension, over a thousand businesses of varying size. It remains to be seen whether Labor Day will see a high-profile ransomware meltdown as well, but one thing is clear: Hackers love holidays.
-
+12 +1
Hackers Steal $29 Million From Crypto-Platform “Cream Finance”
Cream Finance, a decentralized finance (DeFI) platform, recently reported that its cryptocurrency wallet has been hacked. Hackers claimed to have stolen over $29 million in cryptocurrency assets! In a tweet earlier today, the company confirmed the hack, stating the extent of damage and the stolen amount. The tweet came an hour after PeckShield, a blockchain security firm, noticed signs of an ongoing crypto-heist.
-
+28 +1
38M Records Were Exposed Online—Including Contact-Tracing Info
Misconfigured Power Apps from Microsoft led to more than a thousand web apps accessible to anyone who found them.
Submit a link
Start a discussion