© 2022 CyberNews - Latest tech news,
product reviews, and analyses.

If you purchase via links on our site, we may receive affiliate commissions.

Security

Dyma Budorin, Hacken: “when it comes to money, everyone must follow cybersecurity essentials“

There is no such thing as a completely safe information system or cyber defense. Despite blockchain's increasing popularity, there are...
Read more about Dyma Budorin, Hacken: “when it comes to money, everyone must follow cybersecurity essentials“

Samir Mujović, Watchdog: “inner threats are just as serious and more likely to arise.“

We all make mistakes; that is how we learn and grow. In cyber security, however, human errors are often neglected,...
Read more about Samir Mujović, Watchdog: “inner threats are just as serious and more likely to arise.“

Derek Nugent, Difenda: “all companies should measure and track their security posture“

As security threats continually evolve, simplifying IT operations as a whole becomes more crucial than ever. Today, when cyber-attacks can...
Read more about Derek Nugent, Difenda: “all companies should measure and track their security posture“

Ben Golub, Storj: “Cloud should be about more than just storage”

Decentralized data storage has started to challenge standard cloud storage and may eventually lead to a big change in how...
Read more about Ben Golub, Storj: “Cloud should be about more than just storage”

Natali Tshuva, Sternum: “you need to be security-minded and expect to have your devices secure by default”

We are entering a period of rapid growth for IoT devices and services, which poses quite a few security risks....
Read more about Natali Tshuva, Sternum: “you need to be security-minded and expect to have your devices secure by default”

Playing with fire: millions of .git folders exposed to public

Nearly two million .git folders containing vital project information are exposed to the public, the Cybernews research team found.
Read more about Playing with fire: millions of .git folders exposed to public

TikTok's top hacker enjoys account takeovers

Yusuf, a 23-year-old bug bounty hunter from Kurdistan, Iraq, is one of TikTok's top contributors. Hacking big tech companies started as a hobby, Yusuf told Cybernews.
Read more about TikTok's top hacker enjoys account takeovers

Revisiting Eternal vulnerabilities amid Halloween horror

Halloween may not be the only scary event enterprises need to start planning for, as a looming threat still slithers in the shadows of the past, waiting for the right time to catch its victims unaware.
Read more about Revisiting Eternal vulnerabilities amid Halloween horror

Matter: new standard to speed-up mainstream smart home adoption

Is your smart home not working as originally imagined? Manufacturers are planning to address the issue by adopting the new Matter standard.
Read more about Matter: new standard to speed-up mainstream smart home adoption

Cyber pet peeve: my kid’s account got hacked

What should you do when your child accidentally opens the virtual doors to hackers?
Read more about Cyber pet peeve: my kid’s account got hacked

Google impersonators target small US firms with COVID grant lure

COVID-related phishing scams are enjoying an unwelcome resurgence – and once again, the miscreants behind them are using trusted brands like Google as the bait, according to fresh research by INKY.
Read more about Google impersonators target small US firms with COVID grant lure

Curb your access privileges, Microsoft tells system admins

Microsoft’s recent security update might be good news for the computer industry, but some system administrators might be reluctant to enable it – as it entails curtailing their unlimited access privileges.
Read more about Curb your access privileges, Microsoft tells system admins

Retailer hit with ransomware after leaving customer data exposed

Online retailer Esquimal leaked the data of thousands of users via an open server. Threat actors apparently noticed this and hit the company with ransomware.
Read more about Retailer hit with ransomware after leaving customer data exposed

Incorrectly disposing of hard drives may cost companies millions in fines

It’s worth thinking about physical data breaches as well as falling foul of a hack.
Read more about Incorrectly disposing of hard drives may cost companies millions in fines

Cyber pet peeve: I accidentally let an intruder in

What is the best way to handle accidentally letting someone into your organization? Tell someone – and quick.
Read more about Cyber pet peeve: I accidentally let an intruder in

Hackable factory robots could injure workers, warns cyber expert

A low-skilled hacker could be just five easy steps away from remotely controlling heavy industry machines, putting workers at risk of injury or worse – that’s the verdict from one cybersecurity firm.
Read more about Hackable factory robots could injure workers, warns cyber expert

Microsoft users targeted by scammers pretending to be Zoom

Comedians have long been known for spoofing celebrities and the like, but nowadays threat actors are increasingly mimicking established brands. In this latest case uncovered by Armorblox, the conferencing app gets the cybercriminal makeover.
Read more about Microsoft users targeted by scammers pretending to be Zoom

Microsoft Defender struggles to live up to name as cyber crooks get smarter

Microsoft’s in-house protection program Defender is taking a pounding from increasingly targeted phishing campaigns – and with just under one in five bogus emails getting through, it isn’t always up to the task of shielding its users.
Read more about Microsoft Defender struggles to live up to name as cyber crooks get smarter

Harvard Business Publishing licensee hit by ransomware

Threat actors got to a database with over 152,000 customer records before its owner, the Turkish branch of Harvard Business Review, closed it. Crooks left a ransom note, threatening to leak the data and inform authorities of the EU’s General Data Protection Regulation (GDPR) violations.
Read more about Harvard Business Publishing licensee hit by ransomware

APT groups likely maintained long-term access to Defense Industrial Base organization

The US law enforcement, FBI, and national security officials disclosed that multiple advanced persistent threat (APT) groups likely infiltrated a Defense Industrial Base organization to steal sensitive information.
Read more about APT groups likely maintained long-term access to Defense Industrial Base organization