There’s at least one thing Republicans and Democrats can agree on in the US Senate: the importance of open-source software in today’s tech world. Seriously. As US Senator Gary Peters (D-MI) said last week, “Open-source software is the bedrock of the digital world.“ His partner across the aisle, Rob Portman (R-OH), agreed, saying, “The computers, […]
Microsoft Warns: Hackers are using open source software and bogus social media accounts to dupe software engineers and IT support staff with fake job offers, that in reality lead to malware attacks. According to threat analysts from Microsoft’s advanced persistent threat (APT) research group, a phishing hacking crew, linked to North Korea’s armed forces, has […]
Targets of ransomware rarely publicly acknowledge attacks. More openness would help everyone. Ransomware is one of the most significant cybersecurity issues we face, as cyber criminals hack into businesses, schools, hospitals, critical infrastructure and more, in order to encrypt files and demand a ransom payment for the decryption key. Despite warnings not to, many victims pay […]
A vulnerability in the TikTok app for Android could have let attackers take over any account that clicked on a malicious link, potentially affecting hundreds of millions of users of the platform. Details of the one-click exploit were revealed in a blog post from researchers on Microsoft’s 365 Defender Research Team. The vulnerability was disclosed to TikTok […]
LastPass started notifying their users of a recent security incident where an “unauthorized party” gained access. The malicious hacker used a compromised developer account to gain access to parts of the password manager’s source code and some proprietary LastPass technical information. In a letter to LastPass users, the company’s CEO Karim Toubba explains that its investigation […]
Cyber attackers regularly exploit unpatched software vulnerabilities, but they continuously target security misconfigurations to gain initial access into victims systems. The US Cybersecurity and Infrastructure Security Agency (CISA), FBI and NSA, as well as cybersecurity authorities from Canada, New Zealand, the Netherlands, and the UK, have created a to-do list for defenders in today’s heightened […]
If you suspect you’ve been hit with a ransomware attack, it’s important to act quickly. Fortunately, there are several steps you can take to give you the best possible chance of minimizing damage and quickly returning to business as usual. 9 Steps For Responding To A Ransomware Attack 1. Isolate The Infected Device: Ransomware that […]
No one is safe from ransomware, and the attack methods are only getting more sophisticated. Ransomware is a type of malware that employs encryption to hold a victim’s information at ransom. Ransomware attacks are the most significant cyber security threat businesses face today. Many businesses are leaving themselves vulnerable because they don’t have an incident response […]
According to analysis by cybersecurity researchers, over half of ransomware attacks are targeting one of three industries; banking, utilities and retail but they’ve warned that all industries are at risk from attacks and no business or industry is safe. This data was gathered during a period when some of the most high-profile ransomware attacks of the past […]
- 1
- 2