Hackers attempted to poison the water supply of a US city
Pinellas Sheriff revealed that attackers tried to raise levels of sodium hydroxide, by a factor of more than 100, in the Oldsmar’s water supply. The scenario described by Pinellas Sheriff…
Personal Data Breaches for GDPR Compliance: Everything You Need to Know
By Dan May, Commercial Director, ramsac In the new era of cybercrime, identifying the proper sanctions and reactions for any business can seem challenging, if not confusing. When it comes…
Cyberattacks On K-12 Education
Carefully allocating limited resources lets districts get the best bang for the buck. By Saryu Nayyar, CEO, Gurucul While we read about a lot of high profile cyberattacks against large…
3.2billion records leaked, Part II
The Largest compilation of emails and passwords (COMB), more than 3.2 billion login credentials, has been leaked on a popular hacking forum. More than 3.2 billion unique pairs of cleartext…
Hackers abuse Plex Media servers for DDoS amplification attacks
Netscout experts warn of DDoS-for-hire services abusing Plex Media servers to bounce junk traffic and amplify DDoS attacks. Security researchers from Netscout discovered DDoS-for-hire services have found a way to abuse Plex…
A Third Of Americans Trust Facebook With Personal Data More Than Government, Study Shows
The level of trust in Facebook versus the government also varies between demographic groups. By Kathryn Robinson, Privacy Expert, Privacy Tiger In today’s ever-changing data-driven society, it’s a challenge for…
5G Security
Towards trustworthy products for resilient networks By David Soldani, CTSO, Huawei Technologies 5G technologies will be applied to many vertical industries and support various usage scenarios, such as applications…
More Internal Security Needed, Less Budget – 10 Tips to Help
By Jody Paterson – Founder and Executive Chairman. ERP Maestro As if internal risks of fraud and data breaches were not high enough, enter in a year of new work…
Operation NightScout: supply chain attack on NoxPlayer Android emulator
Experts uncovered a new supply chain attack leveraging the update process of NoxPlayer, a free Android emulator for PCs and Macs. UPDATE (February 18, 2021): Following the publication of our…
Experts discovered a new Trickbot module used for lateral movement
Experts spotted a new Trickbot module that is used to scan local networks and make lateral movement inside the target organization. Cybersecurity researchers discovered a new module of the Trickbot…
Threat actors took over the domain name perl.com and pointed it to an IP address associated with malware campaigns.
Attackers have taken over the official domain name of The Perl Foundation perl.com and pointed it to an IP address associated with malware campaigns. Users are recommended to avoid visiting…
The Privileged Credential Security Advantage
By Tony Goulding, Cybersecurity Evangelist at Centrify Over time, a causality has emerged that accounts for the majority of security risks for enterprises: privileged accounts lead to data breaches. So…