It was previously believed that North Korean hackers were behind the January 2018 Coincheck hack, but recent developments in the investigation suggest that Russian actors may have been responsible.
- By Kaitlyn DeHaven
- Jun 18, 2019
Researchers at CyberMDX uncovered two vulnerabilities in older versions of an infusion pump that could allow hackers to gain control over the onboard computer.
- By Kaitlyn DeHaven
- Jun 17, 2019
Yubico discovered a hardware flaw in YubiKey FIPS Series devices in mid-March and since then, has updated the firmware version to one that does not contain the bug, as well as replaced the majority of affected devices.
- By Kaitlyn DeHaven
- Jun 17, 2019
Tavis Ormandy, one of Google’s “Project Zero” team’s security researchers discovered a vulnerability that could effectively perform a denial-of-service attack on Windows servers. There is a 90-day disclosure deadline associated with Project Zero, and since it was day 91, Ormandy released the information.
- By Kaitlyn DeHaven
- Jun 14, 2019
Managing the traditional limitations of time and resources means that running a small business on a budget is a challenge, but these difficulties become more pronounced when resources are stretched even further by the increased security demands of new technology.
- By Terry Hearn
- Jun 14, 2019
Bromium®, Inc. has announced the findings of ‘Behind the Dark Net Black Mirror,’ a study that showed the growing risk posed by the dark net to the enterprise.
- By Kaitlyn DeHaven
- Jun 13, 2019
Kapersky security researchers have identified a new phishing attack that takes place in Google Calendar. Threat actors send a Google Calendar invitation to a user that contains a malicious link hosting a phishing URL.
- By Kaitlyn DeHaven
- Jun 13, 2019
It’s often thought that because the servers are behind lock and key and/or in a data center, and because the data is in continuous use, encrypting the server drives isn’t needed since the data is never at-rest.
- By Garry McCracken
- Jun 12, 2019
A subcontractor of U.S. Customs & Border Protection transferred images of travelers and license plates to its network without CBP’s authorization or knowledge. He was subsequently hacked, and the information was compromised.
- By Kaitlyn DeHaven
- Jun 12, 2019
Apple has “you control your data" for a while now, but with these new updates, the data is almost completely the consumers’.
- By Kaitlyn DeHaven
- Jun 06, 2019
LabCorp reported that about 7.7 million patients’ personal information may have been compromised in the AMCA data breach.
- By Kaitlyn DeHaven
- Jun 06, 2019
No matter how good an organization’s perimeter defenses and threat detection systems are, it really is just a matter of when it will get breached.
- By Tom Hickman
- Jun 06, 2019
The AMCA said they hired a third-party external forensics firm to investigate the Quest Diagnostics data breach
- By Kaitlyn DeHaven
- Jun 05, 2019
Quest Diagnostics has warned its 12 million customers that their personal, financial and medical data may have been exposed.
- By Sydny Shepard
- Jun 04, 2019
The endlessly growing mountains of personal, private data collected as part of routine transactions in our digital world continue to be a target for cybercriminals, who are moving beyond digital theft to the real world by targeting the servers that contain this data.
First American Financial Corporation was made aware of a flaw that exposed their client's mortgage documents.
- By Sydny Shepard
- May 29, 2019
Baltimore has been inching closer to restoring computer systems after a ransomeware attack on May 7.
- By Sydny Shepard
- May 24, 2019
While companies and individuals embrace innovation, cybercriminals make use of the new backdoors to improve the scope of their hacking.
Security is now being analyzed during the development process to account for every variable.
- By Jeff Keyes
- May 20, 2019
Google announced its Bluetooth security keys could be vulnerable to attack.
- By Sydny Shepard
- May 17, 2019