The White House Is Deciding Whether to Support a Bureau of Cyber Statistics
The White House Is Deciding Whether to Support a Bureau of Cyber Statistics
Another ransomware operation known as ‘Black Kingdom’ is exploiting the Microsoft Exchange Server ProxyLogon vulnerabilities to encrypt servers. Over the weekend, security researcher Marcus Hutchins, aka MalwareTechBlog, tweeted that a threat actor was compromising Microsoft Exchange servers via the ProxyLogon vulnerabilities to deploy ransomware. Based on the logs from his honeypots, Hutchins states that the threat actor…
Avaddon ransomware gang is threatening to carry out DDoS attacks and data leaks if AXA did not corporate with the attackers. French insurance giant AXA Group announced on Sunday that the company has become a victim of a ransomware attack. The incident affected its IT operations of Asia Assistance in Thailand, the Philippines, Malaysia, and…
Organizations have been warned that hackers have started scanning the internet for Microsoft Exchange servers affected by a series of vulnerabilities that were disclosed by researchers last week. Orange Tsai, principal researcher at security consulting firm DEVCORE, discovered that Microsoft Exchange servers are affected by three vulnerabilities that can be exploited by unauthenticated attackers for…
Geico has filed a data breach notice with the California attorney general’s office, admitting that fraudsters had stolen customers’ driver’s license numbers from its website. In the notice, discovered by TechCrunch, the American auto insurance titan said that from January 21st to March 1st this year, bad actors infiltrated its website using information on its…
The United States Cybersecurity and Infrastructure Security Agency (CISA) this week added single-factor authentication to its list of bad practices. “Single-factor authentication is a common low-security method of authentication. It only requires matching one factor—such as a password—to a username to gain access to a system,” CISA says. While the agency mainly refers to “the…
Bluetooth Vulnerabilities Allow Impersonation Attacks on Devices | IT Security News 27. May 2021 This article has been indexed from Heimdal Security Blog The Carnegie Mellon University (CMU) has recently shared an advisory highlighting some newly discovered Bluetooth security bugs. The advisory states that security specialists at France’s national cybersecurity agency ANSSI have discovered multiple…