The importance of vulnerability management for your organization

Everyone is familiar with home burglaries. Criminals case a house looking for easy access through open windows, unlocked doors, open garages, and the like. Hackers take the same approach electronically and look for network vulnerabilities that grant th… Continue reading The importance of vulnerability management for your organization

Ethical hackers and the economics of security research

Bugcrowd released a report which provides CIOs and CISOs valuable insight on ethical hackers and the economics of security research. New findings indicate a startling shift in the threat landscape with 8 out of 10 ethical hackers recently having identi… Continue reading Ethical hackers and the economics of security research

Humanizing hackers: Entering the minds of those behind the attacks

Have you ever wondered what are hackers like, where they are based, and what are they thinking? They are human like everyone else – you wouldn’t be able to tell a hacker from a regular programmer. But they are often extremely smart software engineers w… Continue reading Humanizing hackers: Entering the minds of those behind the attacks

77% of rootkits are used for espionage purposes

In a new report, Positive Technologies analyzes this past decade’s most infamous families of rootkits – programs that hide the presence of malicious software or traces of intrusion in victim systems. The study finds that the majority of roo… Continue reading 77% of rootkits are used for espionage purposes

CDR: The secret cybersecurity ingredient used by defense and intelligence agencies

It’s very rare that the defense and intelligence community is vulnerable to file-based attacks. After all, for these organizations security is not a business case, it’s a case of national security. More commercial businesses should look to the defense … Continue reading CDR: The secret cybersecurity ingredient used by defense and intelligence agencies

Tech support scams becoming the top phishing threat to consumers

NortonLifeLock published a report detailing the top consumer cybersecurity insights and takeaways from July to September 2021. The latest findings show tech support scams, which often arrive as a pop-up alert convincingly disguised using the names and … Continue reading Tech support scams becoming the top phishing threat to consumers

T-Mobile confirms breach of more than 8 million customers’ data

T-Mobile confirmed Wednesday that the information of more than 8 million customers as well as 40 million former or potential customers who had applied for credit with the company was compromised in a recent data breach. The hacker accessed customers’ names, dates of birth, Social Security numbers, and driver’s license or ID information from some portion of the 7.8 million subscribers exposed in the breach. No phone numbers, account numbers, passwords, or financial information were compromised for paying customers, according to the company. The company did not say if or how many of those 7.8 million customers were also involved in the credit application breach. Names, phone numbers, and PIN numberss of roughly 850,000 active pre-paid customers were exposed. T-Mobile said it has reset all PINs and will be notifying affected customers. The company said the hacker obtained “additional information from inactive pre-paid accounts accessed through prepaid billing files” from […]

The post T-Mobile confirms breach of more than 8 million customers’ data appeared first on CyberScoop.

Continue reading T-Mobile confirms breach of more than 8 million customers’ data

T-Mobile investigates potentially massive breach of consumer data

T-Mobile is investigating claims by a hacker that they have put sensitive information about more than 100 million of the company’s customers up for sale after breaching its servers. The data set includes names, Social Security numbers, addresses, phone numbers and driver’s license information, Motherboard first reported. The sales ad asks for six bitcoin, which is roughly the equivalent to $278,781 as of Monday morning, in exchange for 30 million Social Security numbers and driver’s licenses from the data set. “We are aware of claims made in an underground forum and have been actively investigating their validity,” T-Mobile said in a statement to multiple outlets Sunday. “We do not have any additional information to share at this time.” T-Mobile did not immediately respond to a request for additional comment from CyberScoop. T-Mobile has just over 100 million customers in the United States, meaning that the data set could cover a […]

The post T-Mobile investigates potentially massive breach of consumer data appeared first on CyberScoop.

Continue reading T-Mobile investigates potentially massive breach of consumer data

Hackers returned some of the $600 million they stole from Poly Network, a cryptocurrency firm

An unidentified hacker stole $600 million worth of virtual currencies from Poly Network the cryptocurrency company announced Tuesday. Then in an unusual twist, less than 24 hours later, the hacker began to return some of the stolen money after a public plea from the company. As of publication time, the hacker had returned more than $4,772,000 worth of assets, according to the company. Chainalysis, a cryptocurrency-tracking firm, confirmed Wednesday that funds were on the move. The incident is the largest public attack against the decentralized financed industry to date. The identity of the thieves remains unclear. Poly Network offers a service that promises interoperability between different chains of cryptocurrency, which each have their own digital ledger and act independently of one another. A preliminary investigation by cybersecurity firm SlowMist found that the hacker exploited a vulnerability in a feature that allows for the implementation of exchanges across chains. This allowed […]

The post Hackers returned some of the $600 million they stole from Poly Network, a cryptocurrency firm appeared first on CyberScoop.

Continue reading Hackers returned some of the $600 million they stole from Poly Network, a cryptocurrency firm

DDoS attacks increased 33% in H1 2021

There has been a 33% increase in the number of DDoS attacks in H1 2021, according to a report published by Link11. Between January and June, there were record numbers of attacks compared to the same period last year. The report also found that between … Continue reading DDoS attacks increased 33% in H1 2021