How Phishers Are Slinking Their Links Into LinkedIn

If you received a link to LinkedIn.com via email, SMS or instant message, would you click it? Spammers, phishers and other ne’er-do-wells are hoping you will, because they’ve long taken advantage of a marketing feature on the business networking site which lets them create a LinkedIn.com link that bounces your browser to other websites, such as phishing pages that mimic top online brands (but chiefly Linkedin’s parent firm Microsoft). Continue reading How Phishers Are Slinking Their Links Into LinkedIn

Alkira partners with Exclusive Networks to expand its cloud market share

Alkira has appointed Exclusive Networks, a global trusted cybersecurity specialist for digital infrastructure, as a distributor for its cloud networking as-a-service platform (CNaaS). The deal makes Alkira’s CNaaS platform Cloud Services Exchange (CSX)… Continue reading Alkira partners with Exclusive Networks to expand its cloud market share

Iranian government-backed hackers target critical infrastructure with ransomware, US says

U.S., U.K. and Australian cyber agencies on Wednesday accused Iranian government-sponsored hacking groups of exploiting Microsoft and Fortinet vulnerabilities this year in a bid to deploy ransomware against critical infrastructure. The hackers are interested in taking advantage of known software flaws where they can, the agencies said. The FBI and the Department of Homeland Security’s Cybersecurity and Infrastructure Security Agency in March, May and June saw Iranian “advanced persistent threat” groups capitalizing on Fortinet vulnerabilities, in one case for a server associated with a U.S. municipal government and in another involving networks associated with a U.S.-based hospital focused on children’s care. In October the hackers relied on a Microsoft Exchange ProxyShell vulnerability “to gain initial access to systems in advance of follow-on operations,” the subject of another recent CISA alert. “The Iranian government-sponsored APT actors are actively targeting a broad range of victims across multiple U.S. critical infrastructure sectors, including […]

The post Iranian government-backed hackers target critical infrastructure with ransomware, US says appeared first on CyberScoop.

Continue reading Iranian government-backed hackers target critical infrastructure with ransomware, US says

Kerv acquires Gyrocom to expand its SD-WAN and SASE offerings

Kerv announced the acquisition of Gyrocom, a fast growing network and security integrator with a specialisation in SD-WAN. In addition to SD-WAN, Kerv’s strategic acquisition brings skills in managed networks and network security, including Secure Acce… Continue reading Kerv acquires Gyrocom to expand its SD-WAN and SASE offerings

How do I select an SD-WAN solution for my business?

In a time when businesses are becoming hybrid and remote, companies have been turning more and more to the adoption of SD-WAN solutions, particularly paying attention to their safety and reliability. SD-WAN adoption has also shifted from being mostly u… Continue reading How do I select an SD-WAN solution for my business?

Keysight delivers modular network cybersecurity test platform for hyperscale data centers

Keysight Technologies released APS-100/400GE Series network application and security modular test platform. This new platform delivers hyperscale encryption throughput that enables network equipment manufacturers (NEMs) and data centers operators to va… Continue reading Keysight delivers modular network cybersecurity test platform for hyperscale data centers

FireMon expands support for datacenter and hybrid cloud environments

FireMon released updates to the FireMon platform, helping customers to more effectively manage network security policy in existing data centers while enabling secure adoption of the cloud. In this new release, FireMon builds on its commitment to help c… Continue reading FireMon expands support for datacenter and hybrid cloud environments

Groove ransomware gang is a motley crew of disgruntled hackers, researchers say

Another new ransomware gang is making waves with an unconventional structure, its unique pedigree and an early victim. A coalition of researchers on Thursday explained what makes Groove, a gang that quietly emerged in July with a website, different: Namely, it eschews the traditional ransomware-as-a-service hierarchy in favor of an opportunistic pledge that they’ll work with anyone as long as there’s money to be made. The researchers — from McAfee, Intel 471 and Coveware — traced the group’s origins to a likely split with the Babuk gang, part of a trend of turmoil within extortion groups that use the ransomware-as-a-service (RaaS) model where affiliates get to use an outfit’s malware in exchange for sharing profits. For instance, a disgruntled former Conti affiliate recently leaked the group’s attack playbook. Already, there’s evidence the researchers uncovered that Groove has worked with another ransomware gang, BlackMatter, that likewise recently emerged. That group is […]

The post Groove ransomware gang is a motley crew of disgruntled hackers, researchers say appeared first on CyberScoop.

Continue reading Groove ransomware gang is a motley crew of disgruntled hackers, researchers say

Hackers dump login credentials of Fortinet VPN users in plain-text

By Waqas
Fortinet VPN users are urged to reset their passwords as the company has acknowledged the data to be legitimate.
This is a post from HackRead.com Read the original post: Hackers dump login credentials of Fortinet VPN users in plain-text
Continue reading Hackers dump login credentials of Fortinet VPN users in plain-text

Approov Alliance and Integration Program offers security solutions to protect APIs

Approov introduced the Approov Alliance and Integration Program to ensure that the critical elements of comprehensive mobile app API protection are rigorously tested and work together harmoniously and seamlessly to avoid both data leakage and exposure … Continue reading Approov Alliance and Integration Program offers security solutions to protect APIs