hacking news

Are you interested in reducing your risk profile? Jamf has a solution for that

The threat landscape has changed dramatically over the past decade. As cybercriminals continue to search for new ways to access networks and steal sensitive information, the surface of mobile attacks is expanding as well. Mobile devices have not only become more powerful but also become more vulnerable to cyber attacks, making mobile security an increasingly …

Are you interested in reducing your risk profile? Jamf has a solution for that Read More »

Why Zero Trust should be the foundation of your cybersecurity system

For cybersecurity professionals, separating the “good guys” from the “bad guys” is a major challenge. In the past, most cyberattacks could simply be traced back to outside cybercriminals, cyberterrorists, or rogue nation states. But not anymore. Threats from within organizations – also known as “internal threats” – are growing and cybersecurity practitioners are feeling the …

Why Zero Trust should be the foundation of your cybersecurity system Read More »

Uber blames LAPSUS$ Hacking Group for recent security breach

On Monday, Uber revealed more details regarding the security incident that occurred last week, commenting the attack on a threat actor it believes is linked to the notorious $LAPSUS$ hacking group. “This group typically uses similar technologies to target tech companies, and in 2022 alone Microsoft, Cisco, Samsung, NVIDIA, and Okta, among others,” the San …

Uber blames LAPSUS$ Hacking Group for recent security breach Read More »

New vulnerabilities reported in Baxter Internet-connected infusion pumps

Multiple security vulnerabilities have been detected in Baxter’s Internet-connected infusion pumps that healthcare professionals use in clinical settings to dispense drugs to patients. “Successful exploitation of these vulnerabilities can lead to access to sensitive data and system configuration changes,” the US Cybersecurity and Infrastructure Security Agency (CISA) said in a coordinated advisory report. Infusion pumps …

New vulnerabilities reported in Baxter Internet-connected infusion pumps Read More »

Uber claims no sensitive data was exposed in the latest breach…but there’s more to this

Uber, in an update, said there was “no evidence” that users’ private information had been compromised in a breach of its internal computer systems that was discovered late Thursday. “We have no evidence that the incident involved access to sensitive user data (such as flight history),” the company said. “All of our services including Uber, …

Uber claims no sensitive data was exposed in the latest breach…but there’s more to this Read More »

What is it and how can you protect yourself from it

Organizations and security teams are working to protect themselves from any vulnerability, often unaware that the risk is also from configurations in SaaS applications that are not hardened. The newly published GIFShell attack method, which occurs through Microsoft Teams, is a perfect example of how threat actors can exploit legitimate features and configurations that are …

What is it and how can you protect yourself from it Read More »

4 key takeaways from the webinar “XDR is the perfect solution for small and medium businesses”

Cyber ​​attacks on large organizations dominate the headlines. Therefore, you may be surprised to learn that Small and Medium Enterprises (SMEs) are actually more frequent Targets of cyber attacks. Many small and medium businesses are aware of these risks firsthand. In a recent survey, 58% of CIOs of SMEs said their attack risk is higher …

4 key takeaways from the webinar “XDR is the perfect solution for small and medium businesses” Read More »

Lorenz ransomware exploits Mitel VoIP systems to breach business networks

It has been observed that the operators behind the Lornenz ransomware process are exploiting a critical vulnerability that has now been patched in Mitel MiVoice Connect to gain a foothold in the target environments to pursue malicious activities. “The initial malicious activity originated from a Mitel device located at the periphery of the network,” researchers …

Lorenz ransomware exploits Mitel VoIP systems to breach business networks Read More »