Royal Ransomware Threat Takes Aim at U.S. Healthcare System
Dec 12, 2022Ravie LakshmananHealthcare IT / Ransomware
The U.S. Department of Health and Human Services (HHS) has cautioned of ongoing Royal ransomware attacks targeting...
Hackers Use Trojanized Windows 10 Installer
Mandiant recently identified that in a targeted attack on Ukrainian government entities, trojanized ISO files were used by threat actors to cloak malicious programs...
FBI Charges 6, Seizes 48 Domains Linked to DDoS-for-Hire Service Platforms
Dec 15, 2022Ravie LakshmananCyber Attack / DDoS-for-Hire
The U.S. Department of Justice (DoJ) on Wednesday announced the seizure of 48 domains that offered services...
Samba Issues Security Updates to Patch Multiple High-Severity Vulnerabilities
Dec 17, 2022Ravie LakshmananServer Security / Network Security
Samba has released software updates to remediate multiple vulnerabilities that, if successfully exploited, could allow an...
Over 9 Million Credit Card Data Exposed
An open and unprotected database with 9,098,506 records of credit card transactions was discovered recently by security researcher Jeremiah Fowler and the Website Planet...
Top 5 Web App Vulnerabilities and How to Find Them
Web applications, often in the form of Software as a Service (SaaS), are now the cornerstone for businesses all over the world. SaaS...
CISA Alert: Veeam Backup and Replication Vulnerabilities Being Exploited in Attacks
Dec 16, 2022Ravie LakshmananBackup & Recovery / Zero-Day
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added two vulnerabilities impacting Veeam Backup &...
GitHub Announces Free Secret Scanning for All Public Repositories
Dec 16, 2022Ravie LakshmananSecure Coding / Code Hosting
GitHub on Thursday said it is making available its secret scanning service to all public repositories...
Cyber Security Is Not a Losing Game – If You Start Right Now
Reality has a way of asserting itself, irrespective of any personal or commercial choices we make, good or bad. For example, just recently,...
Facebook Infrastructure Used by Hackers in Phishing
A Meta-Phish attack that could lead to the loss of personally identifiable information (PII), login information, and a Facebook profile link was discovered by...