Sat.Oct 10, 2020

article thumbnail

US Warns: Hackers Chaining Zerologon, Other Vulnerabilities

Data Breach Today

CISA Says APTs Gained Access to State and Local Election Support Systems CISA is warning that sophisticated hacking groups are chaining vulnerabilities together, such as the recent Zerologon bug along with other flaws, to target state and local government networks. In some cases, attackers gained access to election support systems.

article thumbnail

Russian Cybercrime group is exploiting Zerologon flaw, Microsoft warns

Security Affairs

Microsoft has uncovered Zerologon attacks that were allegedly conducted by the infamous TA505 Russia-linked cybercrime group. Microsoft spotted a series of Zerologon attacks allegedly launched by the Russian cybercrime group tracked as TA505 , CHIMBORAZO and Evil Corp. Microsoft experts spotted the Zerologon attacks involving fake software updates, the researchers noticed that the malicious code connected to command and control (C&C) infrastructure known to be associated with TA505.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Researchers Found 55 Flaws in Apple's Corporate Network

WIRED Threat Level

The company has patched the vulnerabilities and paid the team of white-hat hackers $288,000.

Security 102
article thumbnail

Belgium telecom operators Proximus and Orange drop Huawei

Security Affairs

Major Belgium’s telecom operator Proximus announced on Friday that it will gradually replace its equipment from the Chinese manufacturer Huawei. One of the major Belgium telecom operator Proximus announced on Friday that it will gradually replace its equipment from the Chinese manufacturer Huawei. The company will replace the network equipment from the Chinese giant with products from the Europea vendors Nokia and Ericsson.

article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

The Observer view on the information commissioner's Cambridge Analytica investigation | Observer editorial

The Guardian Data Protection

This newspaper’s exposé of the exploitation of private data has been vindicated The 2018 Observer investigation into a hitherto obscure political consultancy sparked the most serious crisis yet to disrupt the world’s secretive social media giants and shed terrifying light on how their collection of our data reshaped political campaigning. Today, Cambridge Analytica is a household name.

77

More Trending

article thumbnail

The Law Comes for John McAfee

WIRED Threat Level

Plus: A buggy chastity lock, Iranian disinformation, and more of the week’s top security news.

article thumbnail

Google enhances malware protection for accounts enrolled in Advanced Protection Program (APP)

Security Affairs

Google improves malware protection for Google Chrome users who are covered by the company’s Advanced Protection Program (APP). The Advanced Protection Program aims at protecting users with high visibility and sensitive information (i.e. activists, journalists, and political parties), who are exposed to the risk of targeted attacks. Google announced an improved malware protection.