Fity Feeds
-
Cybersecurity continues to be a challenge for businesses of all sizes, especially as workers are shifting to a remote workforce globally.
-
The UK’s National Cyber Security Centre (NCSC) has launched the next phase of its Cyber Aware campaign, which aims to help individuals and small businesses protect themselves online. The campaign, led by NCSC in conjunction with the Cabinet Office, Department for Digital, Culture, Media & Sport (DCMS) and the Home Office, has been running for…
-
Reports are coming in that the stock Mail application preloaded on iOS devices, including iPhones and iPads, contains a zero-day vulnerability that hackers may have been exploiting for years, exfiltrating data while flying under the radar. But before we get into the details, here’s a public service announcement:
-
What consequences do data leaks have for employees? To answer this question, we start by exploring the causes of most such incidents, which, in my experience, are frequently rooted in sloppiness, employee irresponsibility, or ineffective management. In other words, no matter how you look at it, the human factor lies at the heart of the…
-
[embedded content]
-
Qualys CEO Philippe Courtot this week committed to expanding the reach of its Vulnerability Management, Detection and Response (VMDR) cloud platform to include endpoint detection and response (EDR), incident management capabilities and compliance tools.
-
More than 80 coronavirus-related phishing and scam websites have been taken down just one day after the UK’s National Cyber Security Centre asked for the public to report suspicious emails. On Tuesday, the NCSC, in collaboration with the government and the City of London Police launched the ‘Suspicious Email Reporting Service’ urging people to alert…
-
Cyber security professionals working for the World Health Organisation (WHO) have “never been busier”, according to its CIO, as top officials are being targeted by constant phishing campaigns. The organisation has had to increase its security resources while it deals with the outbreak of COVID-19, the WHO’s chief information officer (CIO), Bernardo Mariano, told Bloomberg.…
-
From remote administration and jackpotting, to malware sold on the Darknet, attacks against ATMs have a long and storied history. And, much like other areas of cybercrime, attackers only refine and grow their skillset for infecting ATM systems from year-to-year. So what does the ATM landscape look like as of 2020? Let’s take a look.
-
For the 139th edition of the Kaspersky Transatlantic Cable podcast, Dave and I continue in our usual format, talking about current events and adding in some practical tips from one of our experts.
-
The Mail application in iOS is affected by two critical zero-day vulnerabilities that appear to have been exploited in targeted attacks since at least January 2018, cybersecurity automation company ZecOps reported on Wednesday.
-
Apple has reportedly patched a pair of critical vulnerabilities in iOS that are being exploited by what appears to be government-backed hackers to spy on high-value targets. Think senior executives, journalists, managed security service providers, and similar.
-
According to a new WSJ report and confirmed subsequently by TechCrunch, Bill Gurley, among the most famous of Silicon Valley’s venture capitalists, is stepping way from Benchmark, the early-stage venture firm that was founded in 1995 and which Gurley joined soon after, in 1999. He will not be investing the firm’s 10th venture fund, which…
-
Apple has reportedly patched a pair of critical vulnerabilities in iOS that are being exploited by what appears to be government-backed hackers to spy on high-value targets. Think senior executives, journalists, managed security service providers, and similar.
-
The acceleration of in-house development enabled by public cloud and Software-as-a-Service (SaaS) platform adoption in the last few years has given us new levels of visibility and access to data. Putting all of that data together to generate insights and action, however, can substitute one challenge for another.
-
Written by Jeff StoneApr 22, 2020 | CYBERSCOOP A lawsuit filed in the wake of a controversial cybersecurity presentation last year has ended with a whimper.
-
One of the flaws is remotely exploitable with no user interaction needed, ZecOps says.
-
Written by Shannon VavraApr 22, 2020 | CYBERSCOOP A zero-day vulnerability in Apple’s Mail application for iOS has been used to target high-profile victims around the world for more than two years, according to ZecOps research published Wednesday.
-
More than 12 government-backed hacker groups are exploiting the COVID-19 pandemic as cover for digital reconnaissance and espionage, a new report by Google’s Threat Analysis Group finds.
-
Over the last fifteen years, attacks against critical infrastructure (figure1) have steadily increased in both volume and sophistication. Because of the strategic importance of this industry to national security and economic stability, these organizations are targeted by sophisticated, patient, and well-funded adversaries. Adversaries often target the utility supply chain to insert malware into devices destined…