Zephyrnet Logo

Tag: Data Breaches

Privacy & Security at Ledger: A Year-in-Review

Things to know: – At Ledger, we are doing what’s necessary to face any future threats and working around the clock to strengthen our security posture and enable our users to keep their data safe.– In 2021, we took concrete actions to upgrade our security standards, ranging from hiring world-class security professionals, improving our data […]

Experts Warn of Hacking Group Targeting Aviation and Defense Sectors

Entities in the aviation, aerospace, transportation, manufacturing, and defense industries have been targeted by a persistent threat group since at least 2017 as part of a string of spear-phishing campaigns mounted to deliver a variety of remote access trojans (RATs) on compromised systems. The use of commodity malware such as AsyncRAT and NetWire, among others, has led enterprise security firm

New MyloBot Malware Variant Sends Sextortion Emails Demanding $2,732 in Bitcoin

A new version of the MyloBot malware has been observed to deploy malicious payloads that are being used to send sextortion emails demanding victims to pay $2,732 in digital currency. MyloBot, first detected in 2018, is known to feature an array of sophisticated anti-debugging capabilities and propagation techniques to rope infected machines into a botnet, not to mention remove traces of other

Spanish Police Arrest SIM Swappers Who Stole Money from Victims Bank Accounts

Spain's National Police Agency, the Policía Nacional, said last week it dismantled an unnamed cybercriminal organization and arrested eight individuals in connection with a series of SIM swapping attacks that were carried out with the goal of financial fraud. The suspects of the crime ring masqueraded as trustworthy representatives of banks and other organizations and used traditional phishing

Critical Security Flaws Reported in Moxa MXview Network Management Software

Technical details have been disclosed regarding a number of security vulnerabilities affecting Moxa's MXview web-based network management system, some of which could be chained by an unauthenticated adversary to achieve remote code execution on unpatched servers. The five security weaknesses "could allow a remote, unauthenticated attacker to execute code on the hosting machine with the highest

Critical Magento 0-Day Vulnerability Under Active Exploitation — Patch Released

Adobe on Sunday rolled out patches to contain a critical security vulnerability impacting its Commerce and Magento Open Source products that it said is being actively exploited in the wild. Tracked as CVE-2022-24086, the shortcoming has a CVSS score of 9.8 out of 10 on the vulnerability scoring system and has been characterized as an "improper input validation" issue that could be weaponized to

Security as Service Platforms Need to Disrupt Their Messaging

The global pandemic is forcing a multitude of businesses to adopt work-from-home models, stretching them beyond their capacity to handle increasing cyberthreats. Security as a Service is in greater...

(PRWeb February 14, 2022)

Read the full story at https://www.prweb.com/releases/security_as_service_platforms_need_to_disrupt_their_messaging/prweb18495067.htm

Hackers Planted Fake Digital Evidence on Devices of Indian Activists and Lawyers

A previously unknown hacking group has been linked to targeted attacks against human rights activists, human rights defenders, academics, and lawyers across India in an attempt to plant "incriminating digital evidence." Cybersecurity firm SentinelOne attributed the intrusions to a group it tracks as "ModifiedElephant," an elusive threat actor that's been operational since at least 2012, whose

France Rules That Using Google Analytics Violates GDPR Data Protection Law

French data protection regulators on Thursday found the use of Google Analytics a breach of the European Union's General Data Protection Regulation (GDPR) laws in the country, almost a month after a similar decision was reached in Austria. To that end, the National Commission on Informatics and Liberty (CNIL) ruled that the transatlantic movement of Google Analytics data to the U.S. is not "

Apple Releases iOS, iPadOS, macOS Updates to Patch Actively Exploited Zero-Day Flaw

Apple on Thursday released security updates for iOS, iPadOS, macOS, and Safari to address a new WebKit flaw that it said may have been actively exploited in the wild, making it the company's third zero-day patch since the start of the year. <!--adsense--> Tracked as CVE-2022-22620, the issue concerns a use-after-free vulnerability in the WebKit component that powers the Safari web browser and

Data Security Standards Are Evolving in Response to Rising Threats

Cybersecurity is a growing concern. In 2018 alone, over 1,200 data breaches were orchestrated and nearly 450 million records were compromised. There will be more pressure to improve cybersecurity as these threats escalate. We have a problem with data security. We are more than 70 years into the digital age. We have found that data […]

The post Data Security Standards Are Evolving in Response to Rising Threats appeared first on SmartData Collective.

5 Data Security Strategies Businesses Should Implement

We have witnessed some horrifying data breaches over the last year. One of the worst was when a team of Chinese hackers penetrated the security of the Microsoft Exchange and accessed the accounts of over 250,000 global organizations. The Colonial Pipeline and SolarWinds were also victims to hackers. While large corporations like these will continue […]

The post 5 Data Security Strategies Businesses Should Implement appeared first on SmartData Collective.

Latest Intelligence

spot_img
spot_img

Chat with us

Hi there! How can I help you?