Category

Blog
“The cloud? Sure, we’re in the cloud. We ported our on-prem solution to a virtual machine.” Heard that from your network hardware vendor recently? Don’t blame Jane Salesperson. She’s been selling appliances for years. It’s what she knows. It’s what she’s commissioned on. For her, and for the appliance company for which she works, the cloud...
Read More
A phishing attack using a novel technique to steal credentials from American Express customers was recently found in an email inbox protected using Microsoft’s Office 365 Advanced Threat Protection (ATP) by Cofense Phishing Defense Center researchers. The phishing campaign targeted both corporate and consumer cardholders with phishing emails full of grammatical errors but with a small but...
Read More
US mobile network operator Sprint said hackers broke into an unknown number of customer accounts via the Samsung.com “add a line” website. “On June 22, Sprint was informed of unauthorized access to your Sprint account using your account credentials via the Samsung.com ‘add a line’ website,” Sprint said in a letter it is sending impacted customers....
Read More
97% of all email users do not know what a phishing email looks like. 21% of all ransomware is sent through email and 92% of all malware is sent through emails. The average financial cost of a data breach is $3.86m. Email phishing is a very dangerous and also very common way for cyber criminals...
Read More
The AWS database was exposed on the internet for several years until it was secured on July 1, 2019.The compromised data included users’ full names, birth dates, genetic health information, and other medical conditions. A misconfigured Amazon Web Services (AWS) database had left more than 3,000 client health reports exposed to the internet for several...
Read More
Apple has disabled the Walkie Talkie app from its Apple Watch products after a vulnerability was discovered enabling bad actors to eavesdrop on iPhone conversations. Apple has temporarily disabled the Walkie-Talkie feature from the Apple Watch due to a vulnerability that could allow potential attackers to eavesdrop in on iPhone calls, a TechCrunch report said....
Read More
The data breach occurred after Nemadji Research Corporation, a contractor of the L.A. County Department of Health Services fell victim to a phishing attack in March 2019.The exposed data includes patient names, addresses, dates of birth, medical record numbers and Medi-Cal identification numbers. Almost 14,591 patients who received medical care through Los Angeles County’s hospitals...
Read More
The server contained source code, passwords, configuration details, and other sensitive information related to GE Aviation’s internal infrastructure.It was one of the 5,495 publicly available Jenkins instances as indexed by Shodan. A publicly available Jenkins server of GE Aviation was found spilling sensitive data out in the open. Security researcher Bob Diachenko came across this...
Read More
Mobile phones have a huge impact on the day-to-day lives and the way one communicates with the world. With leading mobile messaging platform WhatsApp recently revealing a major security flaw that could let hackers access phones, it’s time to reconsider safety measures for mobile networks. Even in the corporate world, it’s hard to find an...
Read More
Around 900 customers are said to have been targeted in the attack, who collectively lost around ¥55 million.The attackers exploited a security flaw in 7pay, a mobile payment app developed by 7-Eleven. Popular supermarket chain 7-Eleven has become the latest victim in a cyber attack. Attackers banked on a security flaw in 7-Eleven’s 7pay and...
Read More
1 3 4 5 6 7 15