June 21, 2021

The Taiwanese memory and storage chip maker ADATA was hit by the Ragnar Locker ransomware gang that also published more than 700GB of stolen data. The Ragnar Locker ransomware gang has published on its leak sites more than 700GB of data stolen from Taiwanese memory and storage chip maker ADATA. The group published the link […]

The post Ragnar Locker ransomware leaked data stolen from ADATA chipmaker appeared first on Security Affairs.

Read More Ragnar Locker ransomware leaked data stolen from ADATA chipmaker

Amid multiple recent reports of hackers breaking into and tampering with drinking water treatment systems comes a new industry survey with some sobering findings: A majority of the 52,000 separate drinking water systems in the United States still haven’t inventoried some or any of their information technology systems — a basic first step in protecting networks from cyberattacks.

Read More How Cyber Safe is Your Drinking Water Supply?

Threat actors in January attempted to poison the water at a US facility, a circumstance that highlights the importance of cybersecurity for water and wastewater utilities. The news that a threat actor in January attempted to poison the water at a facility in the U.S. made the headlines and highlights the importance of protecting critical […]

The post Threat actors in January attempted to poison the water at a US facility appeared first on Security Affairs.

Read More Threat actors in January attempted to poison the water at a US facility

Don’t expect your recently purchased non-fungible token to be of any value in a few years, Facebook is reportedly worried about Apple’s new iPhone OS and what it means for their business, and Apple Silicon is already leaving its mark on the market.

The post Hashtag Trending, June 21, 2021 – NFTs value will plummet; Facebook’s worried about losing business; Apple silicon ruffles competition first appeared on IT World Canada.

Read More Hashtag Trending, June 21, 2021 – NFTs value will plummet; Facebook’s worried about losing business; Apple silicon ruffles competition

Introduction It’s important for a business to be prepared with an exercised business continuity and disaster recovery (BC/DR) plan plan before its hit with ransomware so that it can resume operations as quickly as possible. Key steps and solutions should be followed to prepare and respond to cyber threats or attacks against your organization. It […]

The post An MSP and SMB guide to disaster preparation, recovery and remediation appeared first on Webroot Blog.

Read More An MSP and SMB guide to disaster preparation, recovery and remediation

This episode reports on an email scammer pretending to be the Darkside group, how Google hopes to help boost security for app developers and the latest vishing scams

The post Cyber Security Today, June 21, 2021 – Fake Darkside group threatens companies, Darkside affiliate group hits security camera maker, help from Google for software developers and more first appeared on IT World Canada.

Read More Cyber Security Today, June 21, 2021 – Fake Darkside group threatens companies, Darkside affiliate group hits security camera maker, help from Google for software developers and more

The Center for Security and Emerging Technology has a new report: “Machine Learning and Cybersecurity: Hype and Reality.” Here’s the bottom line:

The report offers four conclusions:

  • Machine learning can help defenders more accurately detect and triage potential attacks. However, in many cases these technologies are elaborations on long-standing methods — not fundamentally new approaches — that bring new attack surfaces of their own.
  • A wide range of specific tasks could be fully or partially automated with the use of machine learning, including some forms of vulnerability discovery, deception, and attack disruption. But many of the most transformative of these possibilities still require significant machine learning breakthroughs.
Read More The Future of Machine Learning and Cybersecurity

The US National Security Agency (NSA) released guidance for securing Unified Communications/Voice and Video over IP Systems (VVoIP). NSA last week released guidance for securing their communication systems, specifically Unified Communications (UC) and Voice and Video over IP (VVoIP). Unified Communications (UC) and Voice and Video over IP (VVoIP) call-processing systems provide enterprises communications and […]

The post NSA releases guidance for securing Unified Communications and VVoIP appeared first on Security Affairs.

Read More NSA releases guidance for securing Unified Communications and VVoIP