Did your WD My Book NAS get Wiped? Put a Brave Face on It

A 2019 vulnerability is being exploited to remotely wipe WD My Book Live NAS devices, by Eastern-European malefactors.
The post Did your WD My Book NAS get Wiped? Put a Brave Face on It appeared first on Security Boulevard.
Continue reading Did your WD My Book NAS get Wiped? Put a Brave Face on It

Data Clean Rooms for Innovation and Collaboration

Data, being a key enabler for innovation, growth, development and revenue, is the currency of the 21st century and an organization’s most valuable asset. Unlike a tangible asset, the value an organization can seek from data is endless; essentially, th… Continue reading Data Clean Rooms for Innovation and Collaboration

Dell BIOSConnect Flaws Show Over-the-Air Risks

Because tech vendors have turned to over-the-air updates – the idea is to not give their customers any excuses for not keeping firmware current – Eclypsium’s discovery of a chain of four vulnerabilities in the BIOSConnect feature within Dell Client BI… Continue reading Dell BIOSConnect Flaws Show Over-the-Air Risks

In Memoriam: John McAfee, 1945–2021. R.I.P.

John David McAfee took his own life yesterday, in a Spanish prison.
The post In Memoriam: John McAfee, 1945–2021. R.I.P. appeared first on Security Boulevard.
Continue reading In Memoriam: John McAfee, 1945–2021. R.I.P.

Google Shares Format for Open Source Vulnerability Data

Google, in collaboration with several open source communities, today unveiled a schema for describing vulnerabilities in open source software that will make it easier to for developers to track security issues that impact their applications. Dan Loren… Continue reading Google Shares Format for Open Source Vulnerability Data

I Triggered a Ransomware Attack – Here’s What I Learned

Ransomware attacks are perceived as complicated, confusing and dangerous. While all those things are true, there are also some basic truths about ransomware attacks that can be used to stop an attack quickly, minimizing or eliminating the damage they … Continue reading I Triggered a Ransomware Attack – Here’s What I Learned

Ransomware and the Tax Code’s Perverse Incentive

Ransomware payments are deductible, say tax experts: That’s the shocking finding from a recent investigation.
The post Ransomware and the Tax Code’s Perverse Incentive appeared first on Security Boulevard.
Continue reading Ransomware and the Tax Code’s Perverse Incentive

Data Breach: Bye Domino’s, Hello There McDonald’s!

McDonald’s becomes the latest fast-food chain to suffer a data breach Not so long ago, Domino’s India suffered a cyber attack where personal data related to 18 crore orders were exposed online. This time another food chain company has suffered a cyber … Continue reading Data Breach: Bye Domino’s, Hello There McDonald’s!

Critical Infrastructure is Missing Something Critical

The Colonial Pipeline attack was yet another reminder that critical infrastructure is in desperate need of stronger security. The attack is one of the most recent victims of cyberattacks on critical infrastructure; the phenomenon is not new, nor is it… Continue reading Critical Infrastructure is Missing Something Critical

RedFoxtrot Targets Indian Organizations

RedFoxtrot cyber threat group, which is believed to have links with the Chinese military, has been targeting Indian organizations since becoming active in 2014. This hacker group has particularly focussed on targeting Indian institutions ranging from d… Continue reading RedFoxtrot Targets Indian Organizations