A Pakistani national has been sentenced to 12 years of prison in the US for his role in a hacking scheme against the telecom giant AT&T. The Pakistani national Muhammad Fahd (35) was sentenced to 12 years of prison in the United States for his primary role in a seven-year scheme to illegally unlock nearly […]
The post Pakistani man sentenced to 12 years of prison for his role in AT&T hacking scheme appeared first on Security Affairs.
Read More Pakistani man sentenced to 12 years of prison for his role in AT&T hacking scheme
We are currently experiencing The Great Resignation, where millions of people are leaving their jobs in search of increased satisfaction. The global pandemic gave many the time to think about what work means to them, their contributions to the industry…
Read More How to retain the best talent in a competitive cybersecurity market
Google on Friday said it’s bringing an Android 11 feature that auto-resets permissions granted to apps that haven’t been used in months, to devices running Android versions 6 and above.
Read More Google to Auto-Reset Unused Android App Permissions for Billions of Devices
The expansion is expected to go live later this year in December 2…
In this interview with Help Net Security, Shauli Rozen, CEO at ARMO, talks about securing Kubernetes (K8s) systems, what makes them susceptible to cyberattacks and what should organizations expect when deploying them. As every other platform, Kubernete…
Read More Securing Kubernetes as it becomes mainstream
A newly spotted banking trojan has been caught leveraging legitimate platforms like YouTube and Pastebin to store its encrypted, remote configuration and commandeer infected Windows systems, making it the latest to join the long list of malware targeti…
Read More Numando: A New Banking Trojan Targeting Latin American Users
Data decay is the aging and obsolescence of data in such a way that makes it no longer usable due to loss of its integrity, completeness, and accuracy. Data that can no longer be easily understood, cannot be effectively leveraged and, therefore, lacks …
Read More What businesses need to know about data decay
Over a decade after the zero trust security concept was first introduced, Ericom’s survey results indicate that zero trust solutions are being widely adopted. Spurred by the recent sharp increase in ransomware and other sophisticated cyberattacks, the …
Read More Zero trust security solutions widely adopted, spurred by surge in ransomware
Trend Micro announced that it blocked 40.9 billion email threats, malicious files, and malicious URLs for customers in the first half of 2021, a 47% year-on-year increase. Ransomware remains primary threat in the first half of the year as cybercriminal…
Read More Ransomware still a primary threat as cybercriminals evolve tactics
Amidst ongoing pandemic-driven change at work and at home, a SolarWinds survey seeks to understand how tech pros feel about their daily roles and responsibilities, the lessons they learned over the past year, and what they think of the primary technica…
Read More Tech pros reporting a positive perception of their roles, looking forward to what lies ahead
In 2021, there are two words that can send a cold chill down the spine of any Cybersecurity professional and business leader; Phishing and Ransomware. Research carried out by the Data Analytics and training company CybSafe, identified that 22% of all c…
Read More The Digital Pandemic – Ransomware
15% of organizations are still using a combination of disk and tape backups, with 51% now using online or cloud backups, a research by Databarracks has revealed. The annual report surveys over 400 IT decision-makers in the UK on cloud, backups, cyberse…
Read More Cloud and online backups increasing in popularity, but tape usage remains
Cybersecurity has become a critical concern in every business sector nowadays due to organizations’ growing dependency on technologies. Research by Immersive Lab reported that in 2019 there were more than 20,000 new vulnerabilities. Not only that, Tech…
Read More Everything You Need to Know about Cyber Crisis Tabletop Exercises
How are businesses learning, collaborating, and applying industry best practices? The half-day SecTalks 2021 virtual cybersecurity conference will look at how to quantify security ROI, major vulnerabilities and threats, and proven strategies to evolve,…
Read More How do you measure the impact of security? Find out at SecTalks 2021
A recently discovered zero-click zero-day exploit on iOS, macOS, and watchOS allowed attackers to gain access to a device by sending an iMessage.
Read More What You Need to Know about CVE-2021-30860 aka FORCEDENTRY
Like an iceberg, culture is also hard to move. Read the blog to learn ideas how to do it. | SANS Institute
Read More Why a Strong Security Culture?
The purpose of this blog is to describe the significant update to SANS ICS515 and give more insight in case you’re interested in taking the course.
Read More Introducing the New Version of SANS ICS515 – ICS Visibility, Detection, and Response
Numando, a new banking Trojan that abuses YouTube, Pastebin, and other public platforms as C2 infrastructure and to spread. ESET researchers spotted a new LATAM banking trojan, tracked as Numando, that abuses YouTube, Pastebin, and other public platforms as C2 infrastructure and to spread. The threat actor behind this banking Trojan has been active since […]
The post Numando, a new banking Trojan that abuses YouTube for remote configuration appeared first on Security Affairs.
Read More Numando, a new banking Trojan that abuses YouTube for remote configuration
The popular whistleblower Edward Snowden recommends customers of ExpressVPN VPN service to stop using it. Last week the Israeli cybersecurity firm Kape Technologies has acquired the industry’s leading virtual private networks ExpressVPN, as part of a $936 million deal. Kape announced that the acquisition will more than double its overall customer base, from almost 3 million customers to more than […]
The post Why Edward Snowden is urging users to stop using ExpressVPN? appeared first on Security Affairs.
Read More Why Edward Snowden is urging users to stop using ExpressVPN?
A new round of the weekly Security Affairs newsletter arrived! Every week the best security articles from Security Affairs free for you in your email box. The Biden administration plans to target exchanges supporting ransomware operations with sanctions Threat actor has been targeting the aviation industry since at least 2018 Expert discloses details and PoC […]
The post Security Affairs newsletter Round 332 appeared first on Security Affairs.
Read More Security Affairs newsletter Round 332
Here’s an overview of some of last week’s most interesting news, articles and interviews: Apple fixes “zero-click” iMessage zero-day exploited to deliver spyware (CVE-2021-30860) Apple has released security updates for macOS, iOS, iPadOS, w…
Read More Week in review: Kali Linux 2021.3, how to avoid cloud configuration breaches, hybrid digital dexterity