Eskenzi PR ad banner Eskenzi PR ad banner

News

it security guru

The GandCrab ransomware TOR site allows shady data recovery companies to hide the actual ransom cost from victims and it is currently being disseminated through a large assortment of distribution channels according to a Codeware report. Partnering with recovery firms who frequently access GandCrab's TOR site is an https://www.coveware.com/blog/2018/10/10/gandcrab-ransomware-decryption-payment, with "discount" codes being provided to the most active ones, usable when processing future settlements. Source: Bleeping Computer

Read more
it security guru

More than 59,000 data breaches have been reported across Europe since data protection laws were brought in last year, new figures have revealed. The Netherlands, Germany and the UK topped the list of the most reported breaches in the eight months since new GDPR laws came into force, according to law firm DLA Piper. The breaches, which range from minor errors such as missent emails to major cyber hacks, were reported by public and private...

Read more
it security guru

Godaddy.com, the world’s largest domain name registrar, recently addressed an authentication weakness that cybercriminals were using to blast out spam through legitimate, dormant domains. But several more recent malware spam campaigns suggest GoDaddy’s fix hasn’t gone far enough, and that scammers likely still have a sizable arsenal of hijacked GoDaddy domains at their disposal. Source: Krebs on Security

Read more
it security guru

Researchers say they have identified the threat actor behind the massive “Collection #1” data dump which exposed hundreds of millions of credentials on a hacking forum in January. Recorded Future researchers said this weekend that an individual using the moniker “C0rpz” has claimed as early as Jan. 7 to be the original creator and seller of the Collection #1 data. The original database of breached emails – totalling 773 million unique email addresses –was discovered...

Read more
it security guru

US-based casual dining and fast food restaurant chain Huddle House announced late Friday last week a security breach that impacted its point of sale (POS) system. "Criminals compromised a third-party point of sale (POS) vendor's data system and utilized the vendor's assistance tools to gain remote access-and the ability to deploy malware-to some Huddle House corporate and franchisee POS systems," Huddle House said in a security alert listed on its front page. Source: ZDNet

Read more
Avast And Barracuda Networks Enter Into Master Reseller Relationship.

Avast (LSE:AVST), a global leader in cybersecurity products, and Barracuda Networks, Inc., a leading provider of cloud-enabled security solutions, today announce an agreement under which Barracuda will become a master reseller of Avast Business CloudCare, Avast Management Console and Avast Antivirus Security solutions. “Small to mid-size businesses are currently underserved by the market as security systems tend to be targeted to the needs of larger enterprises. Through Avast’s 30 years of cybersecurity expertise, we have...

Read more
Royal Air Force Selects SecureCloud+ For Team Tempest Network Collaboration Services.

Reading & Farnborough 4 February 2019. SecureCloud+, a trusted provider of next-generation secure information systems to government and defence, has been contracted by the Royal Air Force to deliver network collaboration services for Team Tempest. Team Tempest is a global network of international partners formed by the Royal Air Force Rapid Capability Office (RCO) along with BAE Systems, Rolls Royce, MBDA and Leonardo. SecureCloud+ is the only SME to be part of the team, which...

Read more
it security guru

A 20-year-old college student who stole cryptocurrency worth more than $5 million by hijacking victims' phone numbers has pleaded guilty and accepted a sentence of 10 years in prison. Ortiz was arrested last year on charges of siphoning millions of dollars in cryptocurrency from around 40 victims using a method commonly known as "SIM swapping," which typically involves fraudulently porting of the same number to a new SIM card belonging to the attacker. Source: The...

Read more
Page 306 of 364 1 305 306 307 364