Top 10 cyber risks of 2023 and how to address them

0
The COVID-19 pandemic pushed many development teams into hyper-release cycles for mobile and other web application solutions for their customers. Recent research from Symantec...

Fresh, Buggy Clop Ransomware Variant Targets Linux Systems

0
For the moment, victims can decrypt data without paying a ransom. But Clop is a ransomware variant that has caused havoc on Windows systems,...

Twitter account of US top cybersecurity diplomat hacked

0
US top cybersecurity diplomat and the head of the US State Department’s Bureau for Cyberspace and Digital Policy, Nathaniel Fick, said that his Twitter...

Formbook Malware Spreads via Malvertising Using MalVirt Loader to Evade Detection

0
An ongoing malvertising campaign is being used to distribute virtualized .NET loaders that are designed to deploy the FormBook information-stealing malware. "The loaders, dubbed MalVirt,...

Cybercriminals Are Selling Access to Chinese Surveillance Cameras

0
Tens of thousands of cameras have failed to patch a critical, 11-month-old CVE, leaving thousands of organizations exposed. New research indicates that over 80,000 Hikvision surveillance cameras...

Cyberattack on Fintech Firm Disrupts Derivatives Trading Globally

0
The Russia-linked LockBit ransomware group claims to be behind the attack that fouled automated transactions for dozens of clients of financial technology firm ION...

Creating your own passwords will likely get you hacked, security specialist...

0
Your password has most probably already been compromised – or will be compromised in the nearest future. That’s why utilizing a password manager that...

Vulnerable Historian Servers Imperil OT Networks

0
These specialized database servers, which collect and archive information on device operation, often connect IT and OT networks. Databases are a common point of attack...

Malware Attack on CircleCI Engineer’s Laptop Leads to Recent Security Incident

0
DevOps platform CircleCI on Friday disclosed that unidentified threat actors compromised an employee's laptop and leveraged malware to steal their two-factor authentication-backed credentials to...

Hackers compromise Norton Password Manager

0
Norton LifeLock – the company that promises to keep you cybersafe – discovered an unauthorized third party trying to log into a large swath...