Hundreds of Amazon RDS Snapshots Discovered Leaking Users’ Data
The discovery was made by security researchers at Mitiga
Cyber News, Cyber Threat TrendsThe discovery was made by security researchers at Mitiga
Cyber News, Cyber Threat TrendsThe report suggests 44% agree their firm will cut security spending in the next year
Cyber News, Cyber Threat TrendsA Ukrainian national who has been wanted by the U.S for over a decade has been arrested by Swiss authorities for his role in a notorious cybercriminal ring that stole millions of dollars from victims’ bank accounts using malware called Zeus. Vyacheslav Igorevich Penchukov, who went by online pseudonyms “tank” and “father,” is said to […]
Cyber News, Cyber Threat TrendsThreat actors installed crypto-miner and achieved persistence
Cyber News, Cyber Threat TrendsSince releasing SecureX orchestration, we’ve regularly published two types of content for our customers to import and use: atomic actions and workflows. Atomic actions are small, re-usable functions that allow you to do simple things like isolating an endpoint in Cisco Secure Endpoint. Workflows are more complex combinations of activities, often made up of multiple […]
Cyber News, Cyber Threat TrendsThe NCSC’s founding CEO, Ciaran Martin, explains why the cyber industry is now a public good
Cyber News, Cyber Threat TrendsDon’t let a keen eye for bargains lead you into risky online behaviour…
Cyber News, Cyber Threat TrendsA China-based financially motivated group is leveraging the trust associated with popular international brands to orchestrate a large-scale phishing campaign dating back as far as 2019. The threat actor, dubbed Fangxiao by Cyjax, is said to have registered over 42,000 imposter domains, with initial activity observed in 2017. “It targets businesses in multiple verticals including retail, […]
Cyber News, Cyber Threat TrendsTwitter is having intermittent problems with its two-factor authentication system: Not all users are having problems receiving SMS authentication codes, and those who rely on an authenticator app or physical authentication token to secure their Twitter account may not have reason to test the mechanism. But users have been self-reporting issues on Twitter since the […]
Cyber News, Cyber Threat Trends