The group behind the SolarWinds (SWI.N) hack identified late last year is now targeting US government agencies, consultant groups and non government organizations says Microsoft Corp.
An argument injection vulnerability in the Dragonfly gem before 1.4.0 for Ruby allows remote attackers to read and write to arbitrary files via a crafted URL when the verify_url option is disabled. This may lead to code execution. The problem occurs because the generate and process features mishandle use of the ImageMagick convert utility.
The evolution of the corporate network has rendered legacy security models and solutions obsolete. Software Defined Perimeter solutions, which are devised to limit access to resources only to authorized users, offer cybersecurity and access management designed for the modern enterprise.
As pharmaceutical companies such as Pfizer strive to develop a vaccine for COVID-19, mobile phishing crews are ramping up their tactics in hopes to get their hands on critical pandemic research.
I wanted to take a moment and explain what ransomware is, how it works, and…
The Egregor ransomware uses a classic approach to get a victim’s attention after a successful ransomware attack. Blast print massive amounts of notes to all available printers on the network. Got your attention now?
Trump campaign app tracked millions of American’s and served ‘intimate’ view of social networks: Report
The Trump campaign smartphone app tracked movements of millions of American’s and provided the Trump campaign with an “intimate” view of user’s social networks. The app delivered massive amounts of data that Trump will be able to use in the future for numerous purposes.
KENNEWICK, WA – The Port of Kennewick has stated it was victimized by a ransomware attack.
Video-game-maker Capcom has warned a ransomware attack might have compromised gamers’ personal information. According to Capcom, 350,000 users could be affected due to unauthorized access.
A honeypot is a system that acts as a trap or decoy to attract an attacker and mimics a legitimate system or network with potential vulnerabilities with the goal of gathering intelligence.