Through the BlueKeep vulnerability, it is possible to achieve remote code execution on vulnerable devices. Since the virus can spread, if it’s not contained, it could trigger a much bigger problem.
- By Kaitlyn DeHaven
- Jun 20, 2019
In March, the department announced that 350,000 clients had been affected by a data breach in January 2019. On Tuesday, they updated the number and announced that 645,000 clients had been affected.
- By Kaitlyn DeHaven
- Jun 20, 2019
In May, EatStreet experienced a data breach that compromised certain customers', restaurants', and deliverers' information. The service just recently disclosed the security breach.
- By Kaitlyn DeHaven
- Jun 19, 2019
A year after a privacy researcher showed the world that Venmo transactions could be easily accessed, a computer science student scraped seven million Venmo transactions to increase awareness of the issue.
- By Kaitlyn DeHaven
- Jun 19, 2019
It was previously believed that North Korean hackers were behind the January 2018 Coincheck hack, but recent developments in the investigation suggest that Russian actors may have been responsible.
- By Kaitlyn DeHaven
- Jun 18, 2019
Yubico discovered a hardware flaw in YubiKey FIPS Series devices in mid-March and since then, has updated the firmware version to one that does not contain the bug, as well as replaced the majority of affected devices.
- By Kaitlyn DeHaven
- Jun 17, 2019
Researchers at CyberMDX uncovered two vulnerabilities in older versions of an infusion pump that could allow hackers to gain control over the onboard computer.
- By Kaitlyn DeHaven
- Jun 17, 2019
Tavis Ormandy, one of Google’s “Project Zero” team’s security researchers discovered a vulnerability that could effectively perform a denial-of-service attack on Windows servers. There is a 90-day disclosure deadline associated with Project Zero, and since it was day 91, Ormandy released the information.
- By Kaitlyn DeHaven
- Jun 14, 2019
Managing the traditional limitations of time and resources means that running a small business on a budget is a challenge, but these difficulties become more pronounced when resources are stretched even further by the increased security demands of new technology.
- By Terry Hearn
- Jun 14, 2019
Kapersky security researchers have identified a new phishing attack that takes place in Google Calendar. Threat actors send a Google Calendar invitation to a user that contains a malicious link hosting a phishing URL.
- By Kaitlyn DeHaven
- Jun 13, 2019
Bromium®, Inc. has announced the findings of ‘Behind the Dark Net Black Mirror,’ a study that showed the growing risk posed by the dark net to the enterprise.
- By Kaitlyn DeHaven
- Jun 13, 2019
It’s often thought that because the servers are behind lock and key and/or in a data center, and because the data is in continuous use, encrypting the server drives isn’t needed since the data is never at-rest.
- By Garry McCracken
- Jun 12, 2019
A subcontractor of U.S. Customs & Border Protection transferred images of travelers and license plates to its network without CBP’s authorization or knowledge. He was subsequently hacked, and the information was compromised.
- By Kaitlyn DeHaven
- Jun 12, 2019
Apple has “you control your data" for a while now, but with these new updates, the data is almost completely the consumers’.
- By Kaitlyn DeHaven
- Jun 06, 2019
LabCorp reported that about 7.7 million patients’ personal information may have been compromised in the AMCA data breach.
- By Kaitlyn DeHaven
- Jun 06, 2019
No matter how good an organization’s perimeter defenses and threat detection systems are, it really is just a matter of when it will get breached.
- By Tom Hickman
- Jun 06, 2019
The AMCA said they hired a third-party external forensics firm to investigate the Quest Diagnostics data breach
- By Kaitlyn DeHaven
- Jun 05, 2019
Quest Diagnostics has warned its 12 million customers that their personal, financial and medical data may have been exposed.
- By Sydny Shepard
- Jun 04, 2019
The endlessly growing mountains of personal, private data collected as part of routine transactions in our digital world continue to be a target for cybercriminals, who are moving beyond digital theft to the real world by targeting the servers that contain this data.
First American Financial Corporation was made aware of a flaw that exposed their client's mortgage documents.
- By Sydny Shepard
- May 29, 2019