LaConnecta Loading please wait..
Back to Home

Cyber Security Top Stories

Cyber Security's History

Pierluigi Paganini, Security Affairs

VMware addresses a critical RCE issue in vCenter Server

VMware addressed a critical remote code execution flaw, tracked as CVE-2021-21972, in vCenter Server virtual infrastructure management platform. VMware has addressed a critical remote code execution ..

Continue reading at source

Pierluigi Paganini, Security Affairs

Twitter removes 100 accounts linked to Russia disseminating disinformation

Twitter removed dozens of accounts allegedly used by Russia-linked threat actors to disseminate disinformation and target western countries. Twitter has removed dozens of accounts used by Russia-linke..

Continue reading at source

Becky Bracken, Threatpost

Daycare Webcam Service Exposes 12,000 User Accounts

NurseryCam suspends service across 40 daycare centers until a security fix is in place...

Continue reading at source

Lindsey O'Donnell, Threatpost

IBM Squashes Critical Remote Code-Execution Flaw

A critical-severity buffer-overflow flaw that affects IBM Integration Designer could allow remote attackers to execute code...

Continue reading at source

Pierluigi Paganini, Security Affairs

IBM addressed flaws in Java Runtime, Planning Analytics Workspace, Kenexa LMS

IBM has released security patches to address high- and medium-severity vulnerabilities impacting some of its enterprise solutions.  IBM has released security updates to address several high- and mediu..

Continue reading at source

Elizabeth Montalbano, Threatpost

Finnish IT Giant Hit with Ransomware Cyberattack

A major Finnish IT provider has been hit with a ransomware attack that has forced the company to turn off some services and infrastructure in a disruption to customers, while it takes recovery measure..

Continue reading at source

Cezarina Chirica, Heimdal Security Blog

Understanding the Automated Patch Management Process

There are premises outside of economic implications that draw attention to the importance of Automated Patch Management processes. Keeping systems well informed about the newly-released patches is no ..

Continue reading at source

Brand Post, CSO Online

BrandPost: 5 Often-Overlooked Log Sources

All logs are not created equal. Common logs from servers and firewalls are fairly easily ingested and parsed, while DNS or physical security logs are much tougher to manage at scale, and block visibil..

Continue reading at source

Brand Post, CSO Online

BrandPost: Measuring HP Sure Click Enterprises Return on Investment

HP Security – Sure Click Enterprise has transformed endpoint security with an innovative approach that leverages leading-edge isolation and micro-virtualization technology. Sure Click Enterprises iso..

Continue reading at source

Lindsey O'Donnell, Threatpost

10K Microsoft Email Users Hit in FedEx Phishing Attack

Microsoft users are receiving emails pretending to be from mail couriers FedEx and DHL Express - but that really steal their credentials...

Continue reading at source

Elena Georgescu, Heimdal Security Blog

State-of-the-Art Cybersecurity Strategies: Essential Microsoft EDR Tools

EDR Endpoint Detection and Response should be an essential part of any great cybersecurity strategy. Endpoint security is critical for any company since, only in 2019, “70% of successful breaches or..

Continue reading at source

Brand Post, CSO Online

BrandPost: A New Model for Defeating Cyberattacks and Reducing Costs

We live in a world where the question is no longer whether your company will experience a data breach, but when. Hardly a day goes by that you dont hear about a major data breach or a new cyberattack..

Continue reading at source

bacohido, The Last Watchdog

SHARED INTEL: Forrester poll – security decision makers report breaches escalated as Covid 19 spread

Human suffering and economic losses werent the only two things that escalated with the spread of Covid 19 last year.Related: Can ‘SASE’ help companies secure connectivity?Network breaches..

Continue reading at source

Marc Ambasna-Jones, CSO Online

IT Salary Survey 2021: Hiring rate expected to increase but priorities will shift

Our survey of 1,172 IT professionals finds that demand for some IT skills is strong but the pandemic has influenced the rate of hiring and roles that are being prioritized...

Continue reading at source

Cezarina Chirica, Heimdal Security Blog

Accellion Attackers Stole Data and Breached Companies Running FTA Servers

On Monday, cybersecurity researchers connected a series of attacks targeting Accellion File Transfer Appliance FTA servers over the past two months to a data breach and extortion campaign orchestrat..

Continue reading at source

Graham Cluley

NurseryCam suffers data breach after security concerns raised

A CCTV service designed to let parents remotely watch their children playing at nursery has suffered a data breach after it disputed concerns about its security...

Continue reading at source

Jaikumar Vijayan, CSO Online

5 ways to combat audit fatigue

Cybersecurity audit fatigue has become a very real issue for organizations that are required to comply with multiple government, industry, and internal requirements.To read this article in full, pleas..

Continue reading at source

Brian Nadel, CSO Online

10 things work-from-home employees can do now to help protect the network

With the pandemic turning the business world upside down, offices look less like hives of activity and more like ghost towns. Employees have had to make do with working from home, a dangerous proposit..

Continue reading at source

Pierluigi Paganini, Security Affairs

FIN11 cybercrime group is behind recent wave of attacks on FTA servers

FireEye experts linked a series of attacks targeting Accellion File Transfer Appliance FTA servers to the cybercrime group UNC2546, aka FIN11. Security experts from FireEye linked a series of cyber ..

Continue reading at source

Tomasz Andrzej Nidecki, Acunetix

WAF Security – Getting the Most out of Your Web Application Firewall

Web application firewalls WAFs are one of many web application security solutions at your disposal. Unfortunately, buyers often dont understand their purpose and treat them as a direct replacement ..

Continue reading at source