If the coronavirus pandemic has taught us anything, it is to always be prepared for the worst. The world was woefully under-prepared for a massive,…
Tag: exploit
2 More Breaches Tied to Accellion File Transfer Appliance – BankInfoSecurity.com
Breach Notification , Governance & Risk Management , Incident & Breach Response Latest Victims: Telecom Company Singtel and Australian Medical Research Institute QIMR Berghofer Prajeet…
Singtel hit by third-party vendor’s security breach, customer data may be leaked – ZDNet
Singtel says it is investigating the impact of a cybersecurity breach that may have compromised customer data, after it ascertained on February 9 that “files…
U.S. Cyber Weapons Were Leaked — And Are Now Being Used Against Us, Reporter Says – KPCW
In December 2020, a U.S. cybersecurity company announced it had recently uncovered a massive cyber breach. The hack dates back to March 2020, and possibly…
Lye-poisoning attack in Florida shows cybersecurity gaps in water systems – NBC News
Oldsmar, Florida, experienced one of the biggest fears in cybersecurity Friday — hackers looking to poison its water supply. It’s the kind of breach that…
Big Russian hack used a technique experts had warned about for years. Why wasn’t the U.S. government ready? – The Washington Post
Cybersecurity researchers had warned for years that such an attack was possible. Those from one firm, FireEye, even released hacking tools in 2019 showing exactly…
North Korea targeted cybersecurity researchers using a blend of hacking and espionage – GCN.com
North Korea targeted cybersecurity researchers using a blend of hacking and espionage By Paulo Shakarian Feb 05, 2021 North Korean hackers have staged an audacious…
CSO’s guide to the worst and most notable ransomware
Ransomware has a long history, dating back to the late 1980s. Today, it’s generating billions of dollars in revenue for the criminal groups behind it.…
What Qualifications Do You Need to Be a Penetration Tester? – EC-Council Official Blog – EC-Council Blog
The definition of penetration testing varies among experts. But most professionals agree that pen testing is a process of testing vulnerabilities in IT infrastructure by…
The Untold History of America’s Zero-Day Market
“With the breakup of the Soviet Union, you had a lot of people with skills, without jobs,” Sabien explained. In Europe, hackers, some as young…