Items tagged with cybersecurity
Security breaches and data loss have been rampant problems for companies in recent years, with it seeming like there was a new victim every week. These security issues have also had some dire consequences, such as the first possible ransomware-related death at a hospital. As such, organizations are facing a harsh...
Read more...
Cell phones are a necessity in day-to-day life, allowing communications and access to numerous websites and accounts. Thus, losing access to a phone or text messages could be as bad, if not worse, than losing a credit card. Even more concerning would be if a hacker could intercept texts without the phone's owner even...
Read more...
Black Hat hackers, or simply cybercriminals, can be effective in stealing, leaking, or encrypting data in efforts to extort money from organizations. With the advent of the ProxyLogon vulnerabilities for Microsoft Exchange servers, attackers are now taking advantage of the situation and may ramp up attacks in the...
Read more...
This month, Microsoft Exchange vulnerabilities have been cropping up, and bad actors are looking to take advantage of them. It has been rumored, yet not confirmed, that the recent Acer hack stemmed from the Microsoft Exchange vulnerabilities. Now, another group of advantageous criminals are using the Exchange...
Read more...
Earlier in the month, brewer Molson Coors was allegedly hit by a ransomware attack under the guise of a “cybersecurity incident.” Now, Taiwanese computer manufacturer Acer has reportedly been hit by a REvil ransomware gang attack, and the hackers are demanding the largest known ransom to-date.
The ransomware gang...
Read more...
Zoom has become one of the most popular video conferencing solutions for working and learning from home since the start of the COVID-19 pandemic. Given that the platform is so popular, it is not surprising that security flaws pop up from time to time. Subsequently, researchers from Germany have discovered a glitch in...
Read more...
Over the last nearly two weeks, we have seen Microsoft deploying emergency patches and telling companies to secure Exchange servers due to Chinese hackers exploiting a 0-day vulnerability. When vulnerabilities such as this are published, security researchers and hackers alike jump on the opportunity to develop...
Read more...
Earlier in the week, hackers gained access to over 150,000 Verkada customer camera feeds that allowed them to grab screenshots and video clips. This breach happened because of a “Super Admin” account that was able to view any camera feed. Now, former Verkada employees are coming forward to explain that any employee...
Read more...
In January, Google warned security researchers about sneaky social engineering and hacking attempts coming from North Korea. Originally, the Google Threat Analysis Group (TAG), and other researchers found that the North Korean hacker’s blog compromised anyone who visited the website. Now, Microsoft has patched the...
Read more...
Over the last couple of weeks, hackers have been out in force, breaking into Microsoft Exchange and other services. Now, a group of international hackers who view themselves as vigilantes have breached Silicon Valley-startup Verkada Inc. This gave the hackers access to the live feeds of 150,000 surveillance cameras...
Read more...
Today, Intel signed an agreement with the Defense Advanced Research Projects Agency (DARPA) to "perform in its Data Protection in Virtual Environments (DPRIVE) program." This means that the company will now be working on fully homomorphic encryption, dubbed the "holy grail" of cybersecurity or "the final frontier' in...
Read more...
When we report on cybersecurity breaches, all too often it involves innocent individuals (or companies) that are on the receiving end of the attack. Such is the case with Chinese hackers that exploited Microsoft Exchange servers. Now, it appears that a hacker vigilante has breached four long-running and venerated...
Read more...
When someone resets a password, a code is typically sent to an account holder's email, which is then input into a website (or app) for verification purposes. Moreover, protections should prevent that code from being brute-forced by a hacker, but this isn't always the case. Laxman Muthiyah, a security researcher...
Read more...
Now that Microsoft’s investigation into the Solorigate hack has concluded, it is time to pick up the pieces and plot a [secure] path forward. In doing this, Microsoft has internally utilized several tools, including CodeQL, to hunt for Solorigate activity. Microsoft, however, “believes in leading with transparency and...
Read more...
The Solorigate hack, which ensnared Microsoft, is finally coming to a close for the Redmond, Washington-based company. The Microsoft Security Response Center (MSRC) team wrote a blog post explaining what they had found in the now-completed investigation following the SolarWinds ordeal. It seems that while hackers...
Read more...
Since December, a breach at I.T. administration and monitoring software company SolarWinds has been unfurling to reveal several serious security issues. Many companies and government organizations had data accessed and perhaps even stolen. Now, in an interview that gave an interesting insight into the situation...
Read more...
As long as computers have been around, there have been hackers who have progressively improved and become sneakier at exploiting them. Last year, Microsoft used Microsoft 365 Defender data to find that web shell attacks, which are simple yet effective pieces of malicious code embedded into a web server, are rising...
Read more...
Internet of Things (IoT) devices are prevalent in our daily lives, from voice-control hubs to smart cooking devices. Millions of these types of devices exist in people's homes, and many could have been vulnerable to significant security flaws. Though the issues have been found and largely fixed, it is an important...
Read more...
Some of the United State’s most critical infrastructure are incredibly vulnerable to attack, as we are now finding out. Last Friday, a plant operator at a water treatment facility in Oldsmar, Florida, noticed his mouse dashing around on the screen. The operator did not think much of it then, but when it happened a...
Read more...
Security researchers beware, as Google is reporting that a “government-backed entity based in North Korea” is targeting anyone working on vulnerability research and development. These attackers use several different accounts and means of communication to reach out to a target. Then, they share that they have a 0-day...
Read more...
Do you know when thieves leave their stolen goods out on the front porch for all to see, just because? We didn't think so. Sometimes hackers can be the dumber equivalent of thieves, as we have now found out. It appears that hackers behind a global phishing campaign did not protect their stolen goods and left them out...
Read more...
The SolarWinds breach and subsequent attacks are shaping up to be the most elaborate and long-lasting attacks in some time. Microsoft has done a deep dive into the second stage of the attacks and has found that the attackers are both skilled and elusive. Overall, though, the deep-dive gives us a look into what...
Read more...