Kaseya Left Customer Portal Vulnerable to 2015 Flaw in its Own Software

Last week cybercriminals deployed ransomware to 1,500 organizations that provide IT security and technical support to many other companies. The attackers exploited a vulnerability in software from Kaseya, a Miami-based company whose products help system administrators manage large networks remotely. Now it appears Kaseya’s customer service portal was left vulnerable until last week to a data-leaking security flaw that was first identified in the same software six years ago. Continue reading Kaseya Left Customer Portal Vulnerable to 2015 Flaw in its Own Software

Fake News? Trump’s Twitter ‘Twice Hacked’

President’s Twitter account broken into by Dutch hacker—or so the Dutch hacker claims.
The post Fake News? Trump’s Twitter ‘Twice Hacked’ appeared first on Security Boulevard.
Continue reading Fake News? Trump’s Twitter ‘Twice Hacked’

Researcher: I Hacked Trump’s Twitter by Guessing Password

Trump’s weak Twitter password and lack of basic two-factor authentication protections made it shockingly simple to hack his account, Dutch security researcher Victor Gevers reported.   Continue reading Researcher: I Hacked Trump’s Twitter by Guessing Password

Popular D-Link Router Riddled with Vulnerabilities

D-Link router model 850L has 10 vulnerabilities that could allow a hacker to gain remote access and control of device, according to researcher. Continue reading Popular D-Link Router Riddled with Vulnerabilities

Telnet Credential Leak Reinforces Bleak State of IoT Security

The disclosure and recent analysis of thousands of leaked telnet credentials paints a bleak picture of the state of IoT security. Continue reading Telnet Credential Leak Reinforces Bleak State of IoT Security

Race is On To Notify Owners After Public List of IoT Device Credentials Published

A list of device IPs and credentials has gone viral since Thursday, kicking off an effort by researchers to notify the owners of these connected devices before they’re hacked. Continue reading Race is On To Notify Owners After Public List of IoT Device Credentials Published

Extortionists Wipe Thousands of Databases, Victims Who Pay Up Get Stiffed

Tens of thousands of personal and possibly proprietary databases that were left accessible to the public online have just been wiped from the Internet, replaced with ransom notes demanding payment for the return of the files. Adding insult to injury, it appears that virtually none of the victims who have paid the ransom have gotten their files back because multiple fraudsters are now wise to the extortion attempts and are competing to replace each other’s ransom notes. Continue reading Extortionists Wipe Thousands of Databases, Victims Who Pay Up Get Stiffed

Extortionists Wipe Thousands of Databases, Victims Who Pay Up Get Stiffed

Tens of thousands of personal and possibly proprietary databases that were left accessible to the public online have just been wiped from the Internet, replaced with ransom notes demanding payment for the return of the files. Adding insult to injury, it appears that virtually none of the victims who have paid the ransom have gotten their files back because multiple fraudsters are now wise to the extortion attempts and are competing to replace each other’s ransom notes. Continue reading Extortionists Wipe Thousands of Databases, Victims Who Pay Up Get Stiffed