- Football Fever Puts Password Security at Riskon June 16, 2021 at 10:11 am
With Euro 2020 underway, research uncovers one million football-related passwords
- Most Ransomware Victims Are Hit Again After Payingon June 16, 2021 at 9:18 am
In half of cases, victim organizations were attacked by the same group
- 4 steps to prevent spear phishingby Susan Bradley on June 16, 2021 at 9:00 am
It seems like not a day goes by without another ransomware attack making headlines. And where do many of these attacks start? In your users' email inboxes. To read this article in full, please click here(Insider Story)
- IoT Supply Chain Bug Hits Millions of Camerason June 16, 2021 at 8:37 am
Critical vulnerability could allow attackers to eavesdrop on users
- Cyberium malware-hosting domain employed in multiple Mirai variants campaignsby Pierluigi Paganini on June 16, 2021 at 6:16 am
A new variant of the Mirai botnet, tracked as Moobot, was spotted scanning the Internet for vulnerable Tenda routers. Researchers from AT&T Alien Lab have spotted a new variant of the Mirai botnet, tracked asu Moobot, which was scanning the Internet for the CVE-2020-10987 remote code-execution (RCE) issue in Tenda routers. The botnet was linked The post Cyberium malware-hosting domain employed in multiple Mirai variants campaigns appeared first on Security Affairs.
- Fujifilm restores operations after recent ransomware attackby Pierluigi Paganini on June 15, 2021 at 9:17 pm
Japanese multinational conglomerate Fujifilm announced that it has restored operations following the recent ransomware attack. On June 4, the Japanese multinational conglomerate Fujifilm announced that it was hit by a ransomware attack and shut down its network in response to the incident. Around two weeks later the Japanese giant announced that it has restored operations following The post Fujifilm restores operations after recent ransomware attack appeared first on Security Affairs.
- Thousands of publicly accessible VMware vCenter Servers vulnerable to critical flawsby Lucian Constantin on June 15, 2021 at 8:25 pm
Three weeks after releasing patches for a critical vulnerability in VMware vCenter, thousands of servers that are reachable from the internet remain vulnerable to attacks. VMware vCenter is used by enterprises to manage virtual machines, the VMware vSphere cloud virtualization solution, ESXi hypervisors, and other virtualized infrastructure components. [ Learn 12 tips for effectively presenting cybersecurity to the board and 6 steps for building a robust incident response plan. | Sign up for CSO newsletters. ] Remote code execution and authentication bypass On May 25, VMware published a critical advisory and released patches covering two serious vulnerabilities that stem from the use of VMware vCenter plug-ins. The first vulnerability, tracked as CVE-2021-21985, is caused by improper input validation in the Virtual SAN (vSAN) Health Check plug-in that's enabled by default in vCenter Server. To read this article in full, please click here
- BrandPost: The Top Ten Industries Under Cyber Attackby Brand Post on June 15, 2021 at 7:43 pm
As the COVID-19 pandemic triggered a massive shift in internet usage, cybercriminals quickly pounced, launching more than 10 million distributed denial-of-service (DDoS) attacks aimed at crippling targets with a heavy reliance on online services. Attack frequency spiked 20 percent year over year and 22 percent for the last six months of 2020. According to the most recent NETSCOUT Threat Intelligence Report, vital pandemic industries such as ecommerce, streaming services, online learning, and healthcare all experienced increased attention from malicious actors targeting the very online services essential to remote work and online life. To read this article in full, please click here
- The source code of the Paradise Ransomware was leaked on XSS hacking forumby Pierluigi Paganini on June 15, 2021 at 6:53 pm
The source code for the Paradise Ransomware has been released on a hacking forum allowing threat actors to develop their customized variant. The source code for the Paradise Ransomware has been released on the hacking forum XSS allowing threat actors to develop their own customized ransomware operation. The news of the availability of the source The post The source code of the Paradise Ransomware was leaked on XSS hacking forum appeared first on Security Affairs.
- “Homeless Hacker” Arrestedon June 15, 2021 at 6:23 pm
Alleged Santa Cruz County DDoS attacker arrested in Mexico after years on the run