Things to know: – At Ledger, we are doing what’s necessary to face any future threats and working around the clock to strengthen our security posture and enable our users to keep their data safe.– In 2021, we took concrete actions to upgrade our security standards, ranging from hiring world-class security professionals, improving our data […]
Entities in the aviation, aerospace, transportation, manufacturing, and defense industries have been targeted by a persistent threat group since at least 2017 as part of a string of spear-phishing campaigns mounted to deliver a variety of remote access trojans (RATs) on compromised systems.
The use of commodity malware such as AsyncRAT and NetWire, among others, has led enterprise security firm
A new version of the MyloBot malware has been observed to deploy malicious payloads that are being used to send sextortion emails demanding victims to pay $2,732 in digital currency.
MyloBot, first detected in 2018, is known to feature an array of sophisticated anti-debugging capabilities and propagation techniques to rope infected machines into a botnet, not to mention remove traces of other
Spain's National Police Agency, the Policía Nacional, said last week it dismantled an unnamed cybercriminal organization and arrested eight individuals in connection with a series of SIM swapping attacks that were carried out with the goal of financial fraud.
The suspects of the crime ring masqueraded as trustworthy representatives of banks and other organizations and used traditional phishing
Technical details have been disclosed regarding a number of security vulnerabilities affecting Moxa's MXview web-based network management system, some of which could be chained by an unauthenticated adversary to achieve remote code execution on unpatched servers.
The five security weaknesses "could allow a remote, unauthenticated attacker to execute code on the hosting machine with the highest
Adobe on Sunday rolled out patches to contain a critical security vulnerability impacting its Commerce and Magento Open Source products that it said is being actively exploited in the wild.
Tracked as CVE-2022-24086, the shortcoming has a CVSS score of 9.8 out of 10 on the vulnerability scoring system and has been characterized as an "improper input validation" issue that could be weaponized to
The global pandemic is forcing a multitude of businesses to adopt work-from-home models, stretching them beyond their capacity to handle increasing cyberthreats. Security as a Service is in greater...
A previously unknown hacking group has been linked to targeted attacks against human rights activists, human rights defenders, academics, and lawyers across India in an attempt to plant "incriminating digital evidence."
Cybersecurity firm SentinelOne attributed the intrusions to a group it tracks as "ModifiedElephant," an elusive threat actor that's been operational since at least 2012, whose
French data protection regulators on Thursday found the use of Google Analytics a breach of the European Union's General Data Protection Regulation (GDPR) laws in the country, almost a month after a similar decision was reached in Austria.
To that end, the National Commission on Informatics and Liberty (CNIL) ruled that the transatlantic movement of Google Analytics data to the U.S. is not "
Apple on Thursday released security updates for iOS, iPadOS, macOS, and Safari to address a new WebKit flaw that it said may have been actively exploited in the wild, making it the company's third zero-day patch since the start of the year.
<!--adsense-->
Tracked as CVE-2022-22620, the issue concerns a use-after-free vulnerability in the WebKit component that powers the Safari web browser and
Cybersecurity is a growing concern. In 2018 alone, over 1,200 data breaches were orchestrated and nearly 450 million records were compromised. There will be more pressure to improve cybersecurity as these threats escalate. We have a problem with data security. We are more than 70 years into the digital age. We have found that data […]
We have witnessed some horrifying data breaches over the last year. One of the worst was when a team of Chinese hackers penetrated the security of the Microsoft Exchange and accessed the accounts of over 250,000 global organizations. The Colonial Pipeline and SolarWinds were also victims to hackers. While large corporations like these will continue […]