Sat.Apr 30, 2022 - Fri.May 06, 2022

Ukraine and Romania Suffer Large Scale DDoS Attacks

Data Breach Today

Killnet Claims Responsibility for Targeting Romanian Authorities The Computer Emergency Response Team of Ukraine, along with the National Bank of Ukraine, are warning of massive DDoS attacks against pro-Ukrainian targets.

SolarWinds Attackers Gear Up for Typosquatting Attacks

Dark Reading

The same infrastructure traced back to Russian-speaking threat group Nobelium is being used to set up misspelled domain names, presaging impersonation attacks bent on credential harvesting, analysts say


Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

IoT and Cybersecurity: What’s the Future?

Security Affairs

IoT gizmos make our lives easier, but we forget that these doohickeys are IP endpoints that act as mini-radios. They continuously send and receive data via the internet and can be the easiest way for a hacker to access your home network.

IoT 109

Russia to Rent Tech-Savvy Prisoners to Corporate IT?

Krebs on Security

Image: Proxima Studios, via Shutterstock.

IT 228

Cyber Security, Change Management and Enterprise Risk Management: Scaling Operations for Growth

Speaker: William Hord, Vice President of Risk Management and Compliance

Join us as we discuss the various tangents of data and the change management process that will help you make better risk-based business decisions to save time and money for your organization.

Phisher Jailed After Tricking Pentagon Out of $24 Million

Data Breach Today

California Resident Found Guilty on Total of 6 Criminal Counts Sercan Oyuntur, a 40-year-old California resident, has been found guilty of stealing payments of over $23 million from the U.S. Department of Defense, according to the U.S. Department of Justice.

More Trending

AI for Cybersecurity Shimmers With Promise, but Challenges Abound

Dark Reading

Companies see AI-powered cybersecurity tools and systems as the future, but at present nearly 90% of them say they face significant hurdles in making use of them

China-linked APT Curious Gorge targeted Russian govt agencies

Security Affairs

China-linked Curious Gorge APT is targeting Russian government agencies, Google Threat Analysis Group (TAG) warns.

How Russia-Ukraine Is Intensifying Healthcare Cyber Worries

Data Breach Today

John Riggi and Carolyn Crandall Discuss the Top Threats John Riggi, national adviser for cybersecurity at the American Hospital Association, and Carolyn Crandall, chief security advocate at Attivo Networks, explain why threats involving the Russia-Ukraine war are exacerbating cybersecurity pressures on healthcare sector entities in the U.S.

GUEST ESSAY: Leveraging ‘zero trust’ and ‘remote access’ strategies to mitigate ransomware risks

The Last Watchdog

Ransomware? I think you may have heard of it, isn’t the news full of it? Well, the stats are even scarier with over 50% increase in ransomware attacks in 2021, compared to 2020. Related: Make it costly for cybercriminals. The media paid close attention to ransomware attacks last year, as they had a significant impact on Colonial Pipeline, the nation’s largest fuel distributor, and JBS, the nation’s largest meat distributor.

Access 155

How Preparation and Strategy Can Be Used to Fight and Defeat Any Ransomware Attack

Speaker: Karl Camilleri, Cloud Services Product Manager at phoenixNAP

Through a detailed analysis of major attacks and their consequences, Karl Camilleri, Cloud Services Product Manager at phoenixNAP, will discuss the state of ransomware and future predictions, as well as provide best practices for attack prevention and recovery.

REvil Revival: Are Ransomware Gangs Ever Really Gone?

Dark Reading

The infamous ransomware group appears to be back from the dead — maybe — and using the old brand, but experts question whether a reconstituted gang will have much success

Pro-Ukraine attackers compromise Docker images to launch DDoS attacks on Russian sites

Security Affairs

Pro-Ukraine hackers are using Docker images to launch distributed denial-of-service (DDoS) attacks against a dozen Russian and Belarusian websites.

Connecticut Becomes 5th US State to Get Data Privacy Law

Data Breach Today

Rules Similar to Privacy Laws Passed in California, Colorado, Virginia and Utah Connecticut has just become the fifth U.S. state to get a comprehensive data privacy and online monitoring law, as Senate Bill No. 6 passed into law on Wednesday.

Security Researchers Find Nearly 400,000 Exposed Databases

eSecurity Planet

Databases contain some of the most critical data in enterprises, so vulnerabilities in them are serious issues.

The 5 Stages of Account-Based Marketing — and How to Win Them All

Successfully complete the five stages of ABM: define, identify, engage, convert, and connect. We’ll show you how to create a unified system with your sales team to help them land more qualified opportunities and connect with prospects like never before.

GitHub to Developers: Turn on 2FA, or Lose Access

Dark Reading

All active GitHub users who contribute code will be required to enable at least one form of two-factor authentication by the end of 2023

China-linked Moshen Dragon abuses security software to sideload malware

Security Affairs

A China-linked APT group, tracked as Moshen Dragon, is exploiting antivirus products to target the telecom sector in Asia. A China-linked APT group, tracked as Moshen Dragon, has been observed targeting the telecommunication sector in Central Asia with ShadowPad and PlugX malware, SentinelOne warns.

Mosyle Raises $196M to Strengthen Apple Security Platform

Data Breach Today

Mosyle Wants to Expand Beyond MDM and Provide a Holistic Apple Security Platform Mosyle closed a $196 million funding round to expand beyond mobile device management and provide a holistic security platform for Apple devices.

MDM 227

Market Leading Cybersecurity and National Security Lawyers David Lashway and John Woods Join Sidley in Washington, D.C.

Data Matters

Washington, D.C. Sidley announced today that David Lashway and John Woods have joined as partners in the firm’s Privacy and Cybersecurity practice in Washington, D.C.

Understanding Cadence Workflow for Developers and Architects

Explore the basics of Cadence and understand the benefits it can provide to your organization. This whitepaper will dive into a brief history of Cadence, how workflows can be put into practice, and how you can apply Cadence to your data infrastructure.

Security Stuff Happens: What Do You Do When It Hits the Fan?

Dark Reading

Breaches can happen to anyone, but a well-oiled machine can internally manage and externally remediate in a way that won't lead to extensive damage to a company's bottom line. Part 1 of a series

IT 108

Phishing Campaign Uses Simple Email Templates


A phishing campaign is using short, terse emails to trick people into visiting a credential-harvesting site, according to Paul Ducklin at Naked Security.

Man Uses Phishing to Trick US DOD Into Paying $23.5M

Data Breach Today

California Resident Found Guilty on Total of 6 Criminal Counts Sercan Oyuntur, a 40-year-old California resident, has been found guilty of stealing payments of over $23 million from the U.S. Department of Defense, according to the U.S. Department of Justice.

China-linked Winnti APT steals intellectual property from companies worldwide

Security Affairs

A sophisticated cyberespionage campaign, dubbed Operation CuckooBees, conducted by the China-linked Winnti group remained undetected since at least 2019.

Detect and Respond to Threats Across Your Applications, Networks, and Infrastructure

Understand how to solve cloud complexity challenges with threat detection tools, analyze security threats anywhere in your stack, and deploy turnkey detection rules mapped to the MITRE ATT&CK framework with Datadog Security Monitoring.

New Ransomware Variant Linked to North Korean Cyber Army

Dark Reading

Researchers use code, Bitcoin transactions to link ransomware attacks on banks to DPRK-sponsored actors

Your KnowBe4 Fresh Content Updates from April 2022


Check out the 67 new pieces of training content added in April, alongside the always fresh content update highlights and new features. Security Awareness Training KnowBe4

Case Study: Where to Begin Your Zero Trust Journey

Data Breach Today

Amit Basu of International Seaways on the Various Approaches to Zero Trust As one embarks on a zero trust journey, it's best to start with a network approach, according to Amit Basu, who is vice president, chief information officer and chief information security officer at International Seaways, a New York-based tanker company.

UNC3524 APT uses IP cameras to deploy backdoors and target Exchange

Security Affairs

A new APT group, tracked as UNC3524, uses IP cameras to deploy backdoors and steal Microsoft Exchange emails.

The Ultimate Guide to Executive Recruiting

Sourcing the right executive candidates and filling key managerial roles in an organization can be difficult, even in the best of times. Download this eBook to level up your discovery process, talent sourcing, and strategies for reaching your best-fit candidates.

Unpatched DNS-Poisoning Bug Affects Millions of Devices, Stumps Researchers

Dark Reading

The security vulnerability puts wide swaths of industrial networks and IoT devices at risk of compromise, researchers warn

IoT 104

The growing need for digital forensic investigators

OpenText Information Management

The statistics about increased cybercrime are everywhere you turn. According to the FBI’s 2021 Internet Crime Report, the FBI Internet Crime Complaint Center saw a record 847,376 complaints in 2021, representing a 7% increase from the prior year.

Community College Suspends Classes Over Ransomware Attack

Data Breach Today

5 Kellogg Community Colleges - and Nearly 8,400 Students - Affected All five campuses of the Kellogg Community College, or KCC, have suspended classes until further notice as the result of a ransomware attack, according to its website.