What's new arround internet

Last one

Src Date (GMT) Titre Description Tags Stories Notes
itsecurityguru.webp 2019-06-11 10:01:02 “Triple Threat” cyber-attack targets Lake City. (lien direct) Lake City was targeted by a malware attack. The ransomware known as “Triple Threat” combines three methods of attack to targeted systems. Many city systems are out of order. All email systems are inoperable. Most land-lines are also out of order. All emergency services, including police and fire, remain intact. Source: WCJB Ransomware Malware
itsecurityguru.webp 2019-06-11 10:00:05 US Customs and Border Protection breach exposes travellers\' images. (lien direct) Images of tens of thousands of travellers crossing the United States’ border have been stolen from an immigration subcontractor in a data breach, US media reported on Monday. The images were snatched from the network of a subcontractor for US Customs and Border Protection (CBP), after the company copied data to its database without the […]
itsecurityguru.webp 2019-06-11 10:00:02 (Déjà vu) Ransomware hits Auburn Food Bank. (lien direct) Ransomware attacks hit indiscriminately and sometimes they may affect charitable organizations that can't afford to surrender to the demand. Auburn Food Bank in King County, Washington, fell victim to a ransomware strain known as GlobeImposter 2.0, which encrypted all computers on their network. Only one machine escaped the attack and is currently used to maintain […] Ransomware
itsecurityguru.webp 2019-06-10 15:01:04 (Déjà vu) Breach Impacting Over 19 Million attributed to Quest, LabCorp, AMCA. (lien direct) Multiple class action lawsuits have been filed against Quest Diagnostics Incorporated and Laboratory Corporation of America Holdings (LabCorp) since they disclosed that the personal and medical information of over 19 million of their customers was exposed in a data breach. The data breach which impacted the clients of both companies was caused by the web […] Data Breach
itsecurityguru.webp 2019-06-10 15:01:00 Malware peddlers tweak old exploit to target Office users. (lien direct) Emails delivering RTF files equipped with an exploit that requires no user interaction (except for opening the booby-trapped file) are hitting European users' inboxes, Microsoft researchers have warned. The exploit takes advantage of a vulnerability in an older version of the Office Equation Editor, which was manually patched by Microsoft in November 2017. Source: HelpNet […] Malware Vulnerability
itsecurityguru.webp 2019-06-10 15:00:03 (Déjà vu) Banks, cloud providers, governments could be impacted by major HSM vulnerabilities. (lien direct) Two security researchers have recently revealed vulnerabilities that can be exploited remotely to retrieve sensitive data stored inside special computer components known as HSMs (Hardware Security Modules). “The presented attacks allow retrieving all HSM secrets remotely, including cryptographic keys and administrator credentials,” researchers said. Furthermore, the two also said they can “exploit a cryptographic bug […]
itsecurityguru.webp 2019-06-10 14:59:05 Hundreds Of Google Play Store Apps At Risk Of Breaking Android Users\' Phones. (lien direct) With Android being an open source type of OS, it’s no surprise that the OS is at risk of being hacked. But now it seems that the risk is a lot closer than expected, as hundreds of apps on the Google Play Store were found to have the potential of breaking user’s smartphones. https://blog.lookout.com/beitaplugin-adware that 238 […]
itsecurityguru.webp 2019-06-10 14:58:02 (Déjà vu) 1.1M Emuparadise Accounts hit by data breach. (lien direct) The Emuparadise retro gaming site has been reported to have suffered a data breach in April 2018. This breach exposed account information for approximately 1.1 million Emuparadise forum members. Over the weekend, people have been reporting receiving notices from Have I Been Pwned and HackNotice stating that their information was found as part of a […] Data Breach
itsecurityguru.webp 2019-06-10 09:58:04 (Déjà vu) Proofpoint Named A Leader In Enterprise Email Security. (lien direct) Proofpoint, Inc., (NASDAQ: PFPT), a leading cybersecurity and compliance company, today announced it has been named a leader in enterprise email security in The Forrester Wave™: Enterprise Email Security, Q2 2019. The report provides a detailed overview of the enterprise email security market and evaluates vendors based on their current offering, strategy, and market presence. […] Guideline
itsecurityguru.webp 2019-06-10 09:57:02 Scammers Pretend To Be CIA To Extort $10K USD From Victims Allegedly Linked To Online Underage Porn. (lien direct) Kaspersky researchers have uncovered a sextortion scheme where scammers pretend to be a corrupt officer of the Central Intelligence Agency (CIA), demanding $10,000 USD in bitcoin from victims whose name they claim to have found in an investigation into online pedophiles. The spoof employee alleges the CIA also holds contact details for the victim's relatives, […]
itsecurityguru.webp 2019-06-10 09:40:04 The Role Of Biometrics In A Post-GDPR World. (lien direct) By David Orme, Senior Vice President at IDEX Biometrics ASA Cast your mind back to April last year. Your inbox filled with email marketing from services and newsletters you signed up to over the years asking you to re-subscribe to their mailing lists – and it's likely you took the opportunity to unsubscribe to many. […]
itsecurityguru.webp 2019-06-10 09:31:05 Ramnit Trojan Resumes Attacks On European Financial Institutions To Spark Tax Season Mayhem. (lien direct) The Ramnit banking Trojan has returned to its old hunting ground after recent forays into the e-commerce space, according to new research from F5 Labs. The discovery follows analysis by F5 Labs and F5's EMEA-based F5 Security Operations Center (SOC) examining active Ramnit banking Trojan Malware configurations in February and March 2019. All signs indicate […] Malware
itsecurityguru.webp 2019-06-10 09:31:02 PLATINUM Is Back – Hacking Group Uses Steganography To Fly Under Security Radar. (lien direct) Kaspersky researchers have uncovered a highly sophisticated cyberespionage campaign aimed at stealing information from South Asian diplomatic, government and military entities. The campaign lasted almost six years and had ties to other recent attacks detected in the region. Further investigation into the tools and methods used in the campaign led researchers to the conclusion that […]
itsecurityguru.webp 2019-06-10 09:30:05 Mobile Devices Eyes North America Telematics Retrofit Market. (lien direct) As major car OEMs and telcos compete to offer the latest EV and autonomous vehicle connectivity solutions, Mobile Devices Ingenierie, a leading provider of Edge Computing Platforms for all Telematics segments, today highlighted the North American retrofit opportunity. Aaron Solomon, Mobile Devices founder and CEO highlighted the current market opportunity: “There are over 280 million […] Guideline
itsecurityguru.webp 2019-06-10 09:30:03 Imperva To Acquire Distil Networks, The Industry-Recognised Leader In Bot Management. (lien direct) Imperva, Inc., the cybersecurity leader championing the fight to secure data and applications wherever they reside, today announced it has signed an agreement to acquire Distil Networks, the global leader in Bot Management. The acquisition reinforces Imperva's market leadership in the application security market and furthers the company's mission to protect business-critical data and applications […] Guideline
itsecurityguru.webp 2019-06-07 11:45:00 The Results Are In – Europe\'s Best Cybersecurity Bloggers Announced! (lien direct) The annual European Cybersecurity Blogger's Awards, sponsored by Synopsys and hosted by Eskenzi PR, took place on Tuesday night in London. The fun and lively awards ceremony was compered by Canon Europe's director of information security, Quentyn Taylor and Javvad Malik, security awareness advocate at KnowBe4. Infosecurity bloggers and judges voted for their favourite cybersecurity […]
itsecurityguru.webp 2019-06-07 09:22:05 UiPath Unveils Public Preview Of Cloud-based Enterprise RPA Platform. (lien direct) Today, UiPath is unveiling its UiPath Enterprise Cloud Platform, bringing its leading Robotic Process Automation (RPA) software to the cloud. Previously only available via its Community Edition, the new deployment option for enterprise customers allows for rapid time to automation and delivers easy scalability, high availability, and reduced IT infrastructure requirements at scale, combined with […] Guideline
itsecurityguru.webp 2019-06-07 09:22:05 Nearly Half Of All Data Is \'Dark\', Creating Major Security Blind Spot For Most UK Companies. (lien direct) UK businesses continue to house 'dark data' within their organisations, creating a honeypot for cybercriminals, finds research from Veritas Technologies, a worldwide leader in enterprise data protection and software-defined storage. The Value of Data study, conducted by Vanson Bourne for Veritas, surveyed 1,500 IT decision makers and data managers across 15 countries, including 100 from […] Guideline
itsecurityguru.webp 2019-06-04 11:25:01 81 Percent Of SMEs Believe That AI Is Fundamental To The Future Of Cyber Security. (lien direct) Senseon has released the results of a research project to understand the state of cyber security in modern SMEs. The research revealed that, while a significant proportion of SMEs believe in their current approach to security, they are struggling when it comes to allocation of budget. There is increasing uncertainty on whether the investment into […]
itsecurityguru.webp 2019-06-04 09:34:01 Multiple Variations Of A Phishing Email Scam Spoofing NAB Hit Inboxes. (lien direct) The banking industry is increasingly becoming a favourite among cybercriminals. After intercepting multiple variations of an email scam spoofing NAB earlier today, MailGuard has now detected another phishing email scam purporting to be from Westpac. Using a display name “Westpac Bank”, the emails are actually sent by what appears to be a compromised account. The […]
itsecurityguru.webp 2019-06-04 09:33:01 Domain Spoofing Continues To Baffle Europe\'s Leading Cybersecurity Vendors. (lien direct) New research into the DMARC status of every exhibitor at Europe's leading infosec event reveals that almost two-thirds are failing to stop scammers impersonate emails purportedly coming from these 'secure' brands. “Look, we know from our own customers that this protocol hasn't been straightforward to deploy and maintain, so we've woven this defence mechanism into […] Guideline
itsecurityguru.webp 2019-06-04 09:32:02 Business Leaders Admit To Knowledge Gaps And A Lack Of Resources Amid The Growing Threat Of Cyber Attack. (lien direct) Today, Nominet releases its report Trouble at the top: The boardroom battle for cyber supremacy, which reveals the attitudes of enterprise boards towards cyber attacks. It highlights a number of knowledge gaps, a lack of resources, and disagreements and discrepancies about who is actually in charge of responding to a breach. The research surveyed more […] Threat
itsecurityguru.webp 2019-06-04 09:32:00 Booking.com And TomTom Committed To Getting More Women Into Tech Roles. (lien direct) Gillian Tans, President and CEO of Booking.com and Corinne Vigreux, Co-founder of TomTom have spoken on the need to get more women into tech roles to future proof modern companies. Both companies use AI and machine learning in all areas of their businesses and want to see more women working in these fields. Speaking on […]
itsecurityguru.webp 2019-06-03 12:55:01 Windows 10 Removes Password Changing Rules. (lien direct) Microsoft has made a move with the most recent version of Windows 10, the May 2019 update. Among the changes introduced, Microsoft has removed the need to change passwords every 60 days. With emerging technology such as 2FA and better breach detection, Microsoft is trying to cut the bungee to password rules developed decades ago […]
itsecurityguru.webp 2019-06-03 12:54:04 (Déjà vu) GandCrab Ransomware Shurts Down with 2.5 Billion in Retirement Savings. (lien direct) After almost a year and a half, the operators behind the GandCrab Ransomware are shutting down their operation and affiliates are being told to stop distributing the ransomware. Filling the gaps left behind by the shutdown of large scale ransomware operations such as TeslaCrypt, CryptoWall, and Spora, GandCrab exploded into the ransomware world on January […] Ransomware Tesla
itsecurityguru.webp 2019-06-03 12:54:00 (Déjà vu) Computer, Server or Homestation? The Ransomware Varies. (lien direct) A variant of the Maze Ransomware, otherwise known as the ChaCha Ransomware, has been spotted being distributed by the Fallout exploit kit. An interesting feature of this ransomware is that it says the ransom amount will be different depending on whether the victim is a home computer, server, or workstation. Malwarebytes security researcher Jérôme Segura […] Ransomware
itsecurityguru.webp 2019-06-03 12:53:01 Coordinated Wave of ATO SIM Swapping Attacks. (lien direct) Numerous members of the cryptocurrency community have been hit by SIM swapping attacks over the past week, ZDNethas learned, in what appears to be a coordinated wave of attacks. SIM swapping, also known as SIM jacking, is a type of ATO (account take over) attack during which a malicious threat actor uses various techniques (usually […] Threat
itsecurityguru.webp 2019-06-03 12:52:04 U.S. Visa Applicants Required to Submit Social Media Usernames. (lien direct) Yesterday the U.S. State Department began implementing its requirement that nearly all U.S. visa applicants submit their social media usernames, previous email addresses and phone numbers as part of the application process. The new requirement, which could affect up to 15 million would-be ravelled to the U.S., is part of a broad expansion of enhanced […]
itsecurityguru.webp 2019-06-03 12:51:03 SUPRA Smart TV Vulnerable to Hijacking. (lien direct) Smart TVs selling under SUPRA brand-name have been found vulnerable to an unpatched remote file inclusion vulnerability that could allow WiFi attackers to broadcast fake videos to the television screen without any authentication with the television. SUPRA is a lesser-known Russia electronics brand on the Internet that manufactures several affordable audio-video equipments, household appliances and […] Vulnerability
itsecurityguru.webp 2019-06-03 12:51:00 (Déjà vu) Undelivered Emails: Phishing Message Informs Users of Emails on Hold. (lien direct) A new phishing campaign is underway that pretends to be a list undelivered email being held for you on your Outlook Web Mail service. Users are then prompted to decide what they wish to do with each mail, with the respective links leading to a fake login form. This campaign is just as interesting as […] Guideline
itsecurityguru.webp 2019-05-31 12:00:04 (Déjà vu) Lack of basic security hygiene putting industrial control systems at risk. (lien direct) Standard security practices among IT companies do not necessarily carry over to the IT departments of other firms, leading to products sold without basic security measures in place. Vulnerabilities discovered in industrial equipment increased 30% in 2018, according to security research firm Positive Technologies, which announced Thursday the discovery of vulnerabilities in APROL industrial process […] Guideline
itsecurityguru.webp 2019-05-31 12:00:00 US government workers smartphones could be putting national security at risk. (lien direct) US government workers may be placing America’s national security at risk as there is no official policy banning them from running their smartphones’ personal and official internet traffic through untrustworthy foreign-hosted VPN services. Source: The Register
itsecurityguru.webp 2019-05-31 11:59:03 Cybersecurity efforts ramped up in Oman. (lien direct) Oman continues to live up to its reputation as a regional cybersecurity heavyweight, after it was revealed that the country thwarted more than 2.6 billion malicious attempts to access its public and private systems in 2018 – at least three times as many as in 2017. Source: The Daily Swig
itsecurityguru.webp 2019-05-31 11:59:01 British university targeted by hackers. (lien direct) British universities are facing a barrage of cyber attacks as hackers attempt to steal government-funded scientific, medical and defence research. A survey of senior IT leaders at 68 universities found that 24 per cent believed their security and defence research had been infiltrated, while 53 per cent said they feared they had been subject to […] Guideline
itsecurityguru.webp 2019-05-31 11:58:02 (Déjà vu) Canadian regulators using Civil Anti-Spam law to fine malware purveyors. (lien direct) Canadian government regulators are using the country's powerful new anti-spam law to pursue hefty fines of up to a million dollars against Canadian citizens suspected of helping to spread malicious software. Source: Krebs on Security Malware
itsecurityguru.webp 2019-05-31 10:59:05 Cybersecurity Mishaps Make Customers Think Twice About Signing Up To A Brand\'s Services. (lien direct) An increased awareness of data security has meant that almost half of UK consumers (49%) now consider the cybersecurity credentials of a company before signing up to its services, according to new research from open source pioneer, SUSE. The survey also revealed a lack of knowledge and concerns around exactly what customer data is held […]
itsecurityguru.webp 2019-05-31 10:59:01 Government Told To Enforce A Minimum Level Of Cyber Security Protection Across All UK Businesses As Annual Cost Of Cybercrime Reaches £21 Billion. (lien direct) Progressive technology provider Evaris is calling for action to establish a mandatory minimum level of IT security for all businesses. The Manchester-based business has launched a petition, backed by IT and cyber security professionals and thought leaders, to put pressure on the government to make the currently optional National Cyber Security Centre's (NCSC's) Cyber Essentials […] Guideline
itsecurityguru.webp 2019-05-30 15:13:04 Fingerprint Biometric Technology – The Key To Getting To \'Know Your Customer\'. (lien direct) By David Orme, Senior Vice President at IDEX Biometrics With cybercriminals becoming ever-more sophisticated, and identity fraud reaching epidemic levels in the UK[1], the need for strict customer identification procedures has never been greater for banks and financial institutions. Know Your Customer, or KYC as it is commonly known, is a mandatory framework currently in […]
itsecurityguru.webp 2019-05-30 14:56:05 Cybersecurity Platform Allows Firms To Provide Proof Of Compliance. (lien direct) ThreatAware – the cybersecurity monitoring and compliance platform – has added a new reporting feature which provides businesses with a full audit trail on any aspect of their IT security. It allows users to create a full report on the status of their cybersecurity and record any actions they have taken – whether they are […]
itsecurityguru.webp 2019-05-30 14:56:00 Positive Technologies Helps To Fix High-Risk Vulnerabilities In B&R APROL Industrial Process Automation Systems. (lien direct) Experts from Positive Technologies ICS Security and Application Analysis departments found multiple vulnerabilities in 12 components of APROL industrial process automation systems made by B&R Automation (Austria). This system is used in the oil and gas industry, energy, mechanical engineering, and other industries. The most dangerous are five vulnerabilities (listed 5, 7, 8, 10, 11 […]
itsecurityguru.webp 2019-05-30 14:54:04 Cybercrime & The Bottom Line: 5 Reasons Why SMEs Can\'t Ignore Cyber Security. (lien direct) The digital world offers many opportunities for business growth however it exposes organisations to new cyber risks. Weak cyber security can leave organisations exposed and the revenue repercussions can be severe. Joe Collinwood, CEO at CySure identifies the risks and how to mitigate them. The benefits of operating in the digital world presents many opportunities […]
itsecurityguru.webp 2019-05-30 14:21:03 Google-protected mobile browsers vulnerable to phishing for over a year. (lien direct) A research project called PhishFarm suggests otherwise, claiming that mobile browsers protected by Google's anti-phishing mechanism failed to detect any phishing sites between mid-2017 and late 2018. Source: NakedSecurity
itsecurityguru.webp 2019-05-30 14:20:02 Hacking in the UK: Unlikely to receive prison time. (lien direct) Nearly 90 per cent of hacking prosecutions in the UK last year resulted in convictions, though the odds of dodging prison remain high, an analysis by The Register has revealed. Source: The Register ★★
itsecurityguru.webp 2019-05-30 14:19:05 Decline in Ransomware phishing campaigns. (lien direct) Malicious URL links in emails are now one of the key threats spreading malware into computer systems, outnumbering email attachments five to one in prevalence. Source: CBR Ransomware Malware ★★★★
itsecurityguru.webp 2019-05-30 14:18:05 Turla Malware discovered attacking European Diplomats. (lien direct) Turla, an infamous advanced persistent threat (APT) group, is using new PowerShell-based tools that provide direct, in-memory loading and execution of malware, executables and libraries. Source: Infosecurity Magazine Malware Threat ★★★★
itsecurityguru.webp 2019-05-30 14:18:02 (Déjà vu) PHPMyAdmin servers infected in Nanshou Campaign. (lien direct) A fresh wave of attacks against MS-SQL and PHPMyAdmin servers has been detected across the globe, launched in the quest for cryptocurrency. Source: ZD Net ★★★
itsecurityguru.webp 2019-05-30 14:17:05 The majority of the UK\'s top websites fail GDPR. (lien direct) A staggering number of the UK’s most popular websites are failing to comply with GDPR, according to a report. A research team from ImmuniWeb selected the 100 most visited websites for each of the 28 European member states, finding that the majority were using non-compliant processes or insecure systems to host and manage user data. […]
itsecurityguru.webp 2019-05-28 14:43:01 Almost 80 Percent Of Cyber Security Professionals Concerned They Don\'t Have The Resources They need. (lien direct) Censornet has released the results of a research project to understand the work challenges facing cyber security professionals, who are struggling to cope with the joint pressures of increasing security alerts, and too few staff to respond. The research revealed that companies are suffering from a lack of resources, both in terms of people and […] ★★★★★
itsecurityguru.webp 2019-05-24 14:40:02 Cyber Risk Management – Bringing Security Intelligence To The Board. (lien direct) Written by Josh Lefkowitz, CEO of Flashpoint Data breaches are costly. According to a recent Ponemon Institute study, the average breach costs an organisation $3.86 million. A separate study found that, although the share price of breach-affected companies shows its sharpest drop 14 days after the breach is made public, there is still a discernible […] ★★★★★
itsecurityguru.webp 2019-05-24 14:40:02 How A Risk-Based Approach To Cybersecurity Can Save Time & Money. (lien direct) Written by Jake Olcott, VP Government Affairs, BitSight If you've glanced at the opinion columns of security industry publications, you've probably seen the term “risk-based” floating around, as in “the time is now for a comprehensive, risk-based approach” or “a risk-based approach to security is key to business alignment.” However, many of these articles fail […]
Last update at: 2024-07-17 08:07:38
See our sources.
My email:

To see everything: Our RSS (filtrered) Twitter