Eskenzi PR ad banner Eskenzi PR ad banner

News

Downing Street

The UK government has proposed new data laws that are designed to boost economic growth and innovation, in addition to clamp down on nuisance calls and minimise cookie pop-ups online. The Data Reform Bill, published after a consultation period, is designed to update the UK's existing data rules, post Brexit. It is designed to unlock organisations' ability to use data more "dynamically," with the government arguing that the EU's GDPR is holding back innovative use...

Read more
Women sitting at chair in front of computer

Cato Networks, a Tel-Aviv based network security company, announced on Tuesday that it was going to be adding network-based capabilities to their Cato SASE cloud product. The Cato SASE Cloud (secure access service edge) was born out of the explosion of remote users and Software as a Service (SaaS) applications. From this came a need for better network-based security.  SASE combines wide-area networking (WAN) with network security services and, in a world first, Cato turned...

Read more
New Linux Malware Dubbed “Almost Impossible” To Detect Found

A researcher has created a website that uses your installed Google Chrome extensions to generate a fingerprint (or tracking hash) of your device that can be used to track you digitally. Digital fingerprints can be used based on various characteristics of a device connecting to a website, including GPU performance, installed Windows applications, hardware configuration, a device's screen resolution, and installed fonts. It is then possible to track a device across websites using the same...

Read more
German Green Party’s Emails Compromised by Hackers

A German Green Party spokesperson told POLITICO that email accounts belonging to the party had been compromised in a cybersecurity incident. Omid Nouripour and Ricarda Lang, the party's co-leaders, were among the hacking victims, in which some messages were forwarded to external servers. Additionally, German magazine Der Spiegel reported Thursday that the attack also affected the party's intranet IT system "Grüne Netz" where it exchanges confidential information. The party spokesperson added "more than these email...

Read more
left hand corner of laptop with WordPress open

Content management system (CMS) provider WordPress has forcibly updated over a million sites in order to patch a critical vulnerability affecting the Ninja Forms plugin. The Wordfence threat intelligence team spotted the flaw in June and documented it in an advisory by the company on Thursday. The document said that the code injection vulnerability made it possible for unauthenticated attackers to call a limited number of methods in various Ninja Forms classes, including one that...

Read more
Gavel

A man from California was sentenced to time in prison on Wednesday after being found guilty of hacking thousands of iCloud accounts, stealing people's nude images and videos and sharing them with conspirators. Hao Huo Chi acted under the online name of 'icloudripper4you'. He would have illegally obtained the iCloud account credentials of approximately 4700 victims and shared their content with other people on more than 300 occasions. US District Judge Kathryn Kimball Mizelle sentenced...

Read more
Computer in dark room

A sophisticated Chinese advanced persistent threat (APT) actor exploited a critical security vulnerability in Sophos' firewall product that came to public attention earlier this year to infiltrate an unnamed South Asian target as part of a highly-targeted attack. Volexity said in a report, "the attacker implement an interesting web shell backdoor, create a secondary form of persistence, and ultimately launch attacks against the customer's staff... These attacks aimed to further breach cloud-hosted web servers hosting...

Read more
Smartphone

A new Android banking malware named MaliBot has been discovered by cybersecurity researchers. The malware poses as a cryptocurrency mining app or the Chrome web browser to target users in Spain and Italy. MaliBot focuses on stealing financial information, like e-banking credentials, crypto wallet passwords, and sensitive personal details. It is also capable of snatching two-factor authentication codes from notifications. The malware was discovered by analysts at F5 Labs, who wrote a report with their...

Read more
Phone with app store open

Cybersecurity researchers from Dr. Web claim to have spotted numerous apps on the Google Play Store in May with adware and information-stealing malware built in. According to the report, the most dangerous of these apps features spyware tools capable of stealing information from other apps' notifications, mainly to capture one-time two-factor authentication (2FA) one-time passwords (OTP) and take over accounts. Three of these apps remain online, the rest of the apps allegedly containing malicious codes...

Read more
Dark room with person sat at two screens

'Blue Mockingbird', a threat actor, targets Telerik UI vulnerabilities to compromise servers, install Cobalt Strike beacons, and mine Monero by hijacking system resources. The attacker leverages the CVE-2019-18935 flaw, a critical severity (CVSS v3.1: 9.8) deserialisation that leads to remote code execution in the Telerik UI library for ASP.NET AJAX. In May 2020, the same threat actor was observed targeting vulnerable Microsoft IIS Servers that used Telerik UI. Sophos researchers reported this week that, according...

Read more
Page 32 of 363 1 31 32 33 363