What Cybersecurity Policy Changes Should We Expect from the Biden Administration?

As the U.S. transitions to a new presidential administration, which can be expected to differ largely from the last, it is hard not to speculate how President Biden’s Administration will reduce the risk of a major cyberattack against the U.S. or her interests.

read more
http://dlvr.it/RxB4K4

Posted in Uncategorized | Leave a comment

Facebook Removes 14 Networks Fueling Deceptive Campaigns

Facebook this week announced that in March it removed a total of 14 networks of accounts from its online services, for spreading deceptive content meant to manipulate public opinion.

read more
http://dlvr.it/Rx9wSj

Posted in Uncategorized | Leave a comment

White Hats Earn $440,000 for Hacking Microsoft Products on First Day of Pwn2Own 2021

On the first day of the Pwn2Own 2021 hacking competition, participants earned more than half a million dollars, including $440,000 for demonstrating exploits against Microsoft products.

read more
http://dlvr.it/Rx9FpZ

Posted in Uncategorized | Leave a comment

Threat Actors Quick to Target (Patched) SAP Vulnerabilities

Threat actors are constantly targeting new vulnerabilities in SAP applications within days after the availability of security patches, according to a joint report issued by SAP and Onapsis.

read more
http://dlvr.it/Rx7KjC

Posted in Uncategorized | Leave a comment

SAP systems are targeted within 72 hours after updates are released

On-premises SAP systems are targeted by threat actors within 72 hours after security patches are released, security SAP security firm Onapsis warns. According to a joint study published by Onapsis and SAP, on-premises SAP systems are targeted by threat actors within 72 hours after security patches are released. Threat actors perform reverse-engineering of the SAP […]

The post SAP systems are targeted within 72 hours after updates are released appeared first on Security Affairs.
http://dlvr.it/Rx6rjJ

Posted in Uncategorized | Leave a comment

The Rise of Industrial IoT and How to Mitigate Risk

With the acceleration of digital transformation and convergence of IT and operational technology (OT) networks, Internet of Things (IoT) and Industrial IoT (IIoT) devices are becoming essential tools for companies in sectors including oil and gas, energy, utilities, manufacturing, pharmaceuticals, and food and beverage.

read more
http://dlvr.it/Rx6FCT

Posted in Uncategorized | Leave a comment

Beware of New “more_eggs” Attack Targets Linkedln Users With Fake Job Offers

Hackers spear-phishing business professionals on LinkedIn with fake job offers and infecting them with malware warns eSentire. eSentire, a leading cybersecurity solutions provider, is warning enterprises and individuals to beware of a new spear-phishing attack with fake job offers to infect them with a sophisticated backdoor Trojan. Backdoor trojans give threat actors remote control over […]

The post Beware of New “more_eggs” Attack Targets Linkedln Users With Fake Job Offers appeared first on Cyber Security News.
http://dlvr.it/Rx66M7

Posted in Uncategorized | Leave a comment

Admin of DeepDotWeb (DDW) Pleads Guilty for Connecting Internet users with Darknet Marketplaces

Recently, the administrator of DeepDotWeb, Tal Parihar has pleaded guilty, as he received kickbacks for connecting all the customers like the buyers and the sellers of the illegal goods on the darknet marketplaces. The administrator of the DeepDotWeb portal, Tal Parihar is an Israeli national of 37-year-old, who is living in Brazil. He confessed that […]

The post Admin of DeepDotWeb (DDW) Pleads Guilty for Connecting Internet users with Darknet Marketplaces appeared first on Cyber Security News.
http://dlvr.it/Rx58C8

Posted in Uncategorized | Leave a comment

Threat Actors Behind Hancitor Malware uses Network Ping Tool to Enumerate Active Directory (AD) Environment

Hancitor is an information stealer and malware downloader used by a threat actor designated as MAN1, Moskalvzapoe, or TA511. Hancitor was noticed quite unsophisticated from 2018, but it remained a threat for years to come. Around three years later, Hancitor remains a threat and has evolved to use tools like Cobalt Strike. In recent months, […]

The post Threat Actors Behind Hancitor Malware uses Network Ping Tool to Enumerate Active Directory (AD) Environment appeared first on Cyber Security News.
http://dlvr.it/Rx2xHN

Posted in Uncategorized | Leave a comment

University of California Victim of Nationwide Hack Attack

The University of California is warning its students and staff that a ransomware group might have stolen and published their personal data and that of hundreds of other schools, government agencies and companies nationwide.

read more
http://dlvr.it/Rx2vPb

Posted in Uncategorized | Leave a comment