Live Webinar | Considerations for Building Your Cybersecurity Strategy in 2021 and BeyondWebinar.
Thank you for registering with ISMG
Complete your profile and stay up to date
Another day, and it’s time for another Apple security scare: malware that can harvest keystrokes and log-ins and is available on the Darknet for only $49. Malware-as-a-service for Mac attacks Check Point Software’s research team claims to have identified the hack, which it is calling XLoader. Enterprise security specialists managing Macs and Apple devices (of which there…
Telegram has exploded as a hub for cybercriminals looking to buy, sell, and share stolen data and hacking tools, new research shows, as the messaging app emerges as an alternative to the dark web. An investigation by cyber intelligence group Cyberint, together with the Financial Times, found a ballooning network of hackers sharing data leaks…
Breach Notification , Fraud Management & Cybercrime , Governance & Risk Management Company Says Employees’ Personal Data Compromised Scott Ferguson (Ferguson_Writes) • August 16, 2021 Photo: Peter D via Flickr/CC The ransomware attack that targeted Colonial Pipeline Co. in May compromised the personal information of more than 5,800 individuals – mainly current or…
Application Security & Online Fraud , Cybercrime , Fraud Management & Cybercrime Google Ad Leads to Malicious App Disguised as Telegram Jeremy Kirk (jeremy_kirk) • March 17, 2021 An illustration of the desktop version of Telegram. (Source: Telegram) Jannis Kirschner, an independent security researcher based in Basel, Switzerland, searched on Sunday for the…
Executive Summary Informations Name CVE-2021-20454 First vendor Publication 2021-04-21 Vendor Cve Last vendor Modification 2021-04-21 Security-Database Scoring CVSS v3 Cvss vector : N/A Overall CVSS Score NA Base Score NA Environmental Score NA impact SubScore NA Temporal Score NA Exploitabality Sub Score NA Calculate full CVSS 3.0 Vectors scores Security-Database Scoring CVSS v2 Cvss…
Business Continuity Management / Disaster Recovery , Fraud Management & Cybercrime , Fraud Risk Management Criminals Regularly Fib About Stealing Data, Sparing Hospitals and Much More Mathew J. Schwartz (euroinfosec) • August 5, 2021 BlackMatter ransom note (Source: Bleeping Computer) If you’re a criminal, practicing good operational security would seem to preclude granting…