Remove vulnerabilities-threats will-this-be-the-year-of-the-branded-cybercriminal-
article thumbnail

Ukrainian Police Nab Six Tied to CLOP Ransomware

Krebs on Security

Authorities in Ukraine this week charged six people alleged to be part of the CLOP ransomware group , a cybercriminal gang said to have extorted more than half a billion dollars from victims. Some of CLOP’s victims this year alone include Stanford University Medical School , the University of California , and University of Maryland.

article thumbnail

MY TAKE: Why locking down ‘firmware’ has now become the next big cybersecurity challenge

The Last Watchdog

It has only been in the past four years or so that white hat researchers and black hat hackers have gravitated over to this unguarded terrain – and begun making hay. Vulnerability research took on a life of its own. Vulnerability research took on a life of its own. Locking down firmware. telecoms by Chinese tech giant Huawei.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Threat actors offer for sale data for 50 millions of Moscow drivers

Security Affairs

Threat actors are offering for sale a database containing 50 million records belonging to Moscow drivers on a hacking forum for $800. Bad news for Russian drivers, threat actors are selling a database containing 50 million records belonging to Moscow drivers on a hacking forum for only $800. ” continues the post.

Sales 98
article thumbnail

Thousands of Data Center Management Apps Exposed to Internet

eSecurity Planet

Researchers with cybersecurity firm Cyble this week said that along with the public-facing data center infrastructure management (DCIM) software, they also found intelligent monitoring devices, thermal cooling management and power monitors for racks vulnerable to cyberattacks. See also: Top Vulnerability Management Tools for 2022.

Passwords 120
article thumbnail

GUEST ESSAY: Six risks tied to social media marketing that all businesses should heed

The Last Watchdog

While the internet and social media have been very positive for businesses, there remains an inherent risk when it comes to how brands manage their Facebook, Twitter, and Instagram accounts. 1 : Cybercrime Businesses should always be very aware of the threat of cybercriminals, and social media also poses very real cyber-security risks.

Risk 138
article thumbnail

The Retail Data Threat Environment and Why CIAM is a Key Cornerstone to Better Cybersecurity.

Thales Cloud Protection & Licensing

The Retail Data Threat Environment and Why CIAM is a Key Cornerstone to Better Cybersecurity. Yet, the heart of retail operations - point-of-sale (POS) devices - are constantly on the radar of scammers, and when it comes to digital interactions, the retail sector is ranked as one of the most vulnerable industries to cyber-attacks.

Retail 71
article thumbnail

Catches of the Month: Phishing Scams for May 2023

IT Governance

Another ChatGPT threat vector emerges Since the emergence of ChatGPT last year, IT Governance has covered the cyber security implications it’s having in comprehensive detail. The latest issue facing the AI landscape is a report detailing phishing campaigns masquerading as ChatGPT.