fbpx

Cybersecurity & IT Threats

Expanding ‘IT Threats’ to include various aspects of cybersecurity, not just threats.

Week in review: 10 cybersecurity frameworks you need to know, exploited Chrome zero-day fixed - Help Net Security

Week in review: 10 cybersecurity frameworks you need to know, exploited Chrome zero-day fixed – Help Net Security

Week in review: 10 cybersecurity frameworks you need to know, exploited Chrome zero-day fixed Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Key elements for a successful cyber risk management strategy In this Help Net Security interview, Yoav Nathaniel, CEO at Silk Security, discusses the evolution of cyber […]

Week in review: 10 cybersecurity frameworks you need to know, exploited Chrome zero-day fixed – Help Net Security Read More »

Trezor Data Breach Exposes Email and Names of 66,000 Users

Trezor Data Breach Exposes Email and Names of 66,000 Users

Trezor, the hardware wallet manufacturer, has disclosed a data breach involving unauthorized access to a third-party support portal used by the company. In a worrying development for cryptocurrency enthusiasts, hardware wallet manufacturer Trezor disclosed a data breach on January 20, 2024, that potentially exposed the contact information of nearly 66,000 users. While the company assures

Trezor Data Breach Exposes Email and Names of 66,000 Users Read More »

23andMe told victims of data breach that suing is futile, letter shows

23andMe told victims of data breach that suing is futile, letter shows

23andMe is “shamelessly” blaming victims of a data breach impacting 6.9 million users, a lawyer representing victims pursuing a class-action lawsuit, Hassan Zavareei, told TechCrunch. Zavareei shared a letter from 23andMe lawyers that urged users suing to “consider the futility of continuing to pursue an action in this case,” because their claims are allegedly meritless

23andMe told victims of data breach that suing is futile, letter shows Read More »

Vercara UltraSecure offers protection from malicious attacks - Help Net Security

Vercara UltraSecure offers protection from malicious attacks – Help Net Security

Vercara UltraSecure offers protection from malicious attacks Vercara is introducing UltraSecure bundles designed to meet the online security needs of mid-size companies. These flexible packages offer enterprise-grade, custom solutions that protect critical applications, secure online properties and increase web performance. While mid-size companies and SMBs have the same security needs as larger enterprises, these organizations

Vercara UltraSecure offers protection from malicious attacks – Help Net Security Read More »

The right strategy for effective cybersecurity awareness - Help Net Security

The right strategy for effective cybersecurity awareness – Help Net Security

The right strategy for effective cybersecurity awareness Employees play a significant role in safeguarding organizational assets. With a constantly evolving threat landscape, cybersecurity awareness training is an essential component in creating a good security culture. Why cybersecurity awareness training? 81% of organizations were hit by malware, phishing, and password attacks in 2022, mostly targeting users.

The right strategy for effective cybersecurity awareness – Help Net Security Read More »

Newcastle chairman faces £58m lawsuit for ‘carrying out’ malicious instructions

Newcastle chairman faces £58m lawsuit for ‘carrying out’ malicious instructions

Newcastle United’s chairman, Yasir al-Rumayyan, is facing a £58m lawsuit for allegedly “having carried out the instructions” of Saudi Arabia’s crown prince, Mohammad bin Salman, with “malicious intent”, it has been reported. The claims, which are said to be made in legal papers sent to Rumayyan at several locations, including at St James’ Park, also

Newcastle chairman faces £58m lawsuit for ‘carrying out’ malicious instructions Read More »

Nation-State Actors Weaponize Ivanti VPN Zero-Days, Deploying 5 Malware Families

Nation-State Actors Weaponize Ivanti VPN Zero-Days, Deploying 5 Malware Families

As many as five different malware families were deployed by suspected nation-state actors as part of post-exploitation activities leveraging two zero-day vulnerabilities in Ivanti Connect Secure (ICS) VPN appliances since early December 2023. “These families allow the threat actors to circumvent authentication and provide backdoor access to these devices,” Mandiant said in an analysis published

Nation-State Actors Weaponize Ivanti VPN Zero-Days, Deploying 5 Malware Families Read More »

Akira ransomware attackers are wiping NAS and tape backups - Help Net Security

Akira ransomware attackers are wiping NAS and tape backups – Help Net Security

Akira ransomware attackers are wiping NAS and tape backups “The Akira ransomware malware, which was first detected in Finland in June 2023, has been particularly active at the end of the year,” the Finnish National Cybersecurity Center (NCSC-FI) has shared on Wednesday. NCSC-FI has received 12 reports of Akira ransomware hitting Finnish organizations in 2023,

Akira ransomware attackers are wiping NAS and tape backups – Help Net Security Read More »

There is a Ransomware Armageddon Coming for Us All

There is a Ransomware Armageddon Coming for Us All

Generative AI will enable anyone to launch sophisticated phishing attacks that only Next-generation MFA devices can stop The least surprising headline from 2023 is that ransomware again set new records for a number of incidents and the damage inflicted. We saw new headlines every week, which included a who’s-who of big-name organizations. If MGM, Johnson

There is a Ransomware Armageddon Coming for Us All Read More »

Threat Actors Increasingly Abusing GitHub for Malicious Purposes

Threat Actors Increasingly Abusing GitHub for Malicious Purposes

The ubiquity of GitHub in information technology (IT) environments has made it a lucrative choice for threat actors to host and deliver malicious payloads and act as dead drop resolvers, command-and-control, and data exfiltration points. “Using GitHub services for malicious infrastructure allows adversaries to blend in with legitimate network traffic, often bypassing traditional security defenses

Threat Actors Increasingly Abusing GitHub for Malicious Purposes Read More »

Scroll to Top