
Cybersecurity
-

Comments by: Yaniv Balmas, Head of Cyber Research at Check Point Software Technologies It is still unclear which ransomware group is involved at the moment. The attackers have exploited an old patched vulnerability in SonicWalls devices, and customers who haven’t updated their devices or were using an End-Of-Life product not applicable for updates are currently at…
-

By: Gary Gardiner, Head of Security Engineering, APAC & Japan, Check Point Software Technologies Received a weird message from a strange number with a link on your phone? Or an email claiming to be a Nigerian prince offering you millions of dollars if you help him with something? These are old and common tactics used…
-

DigiCert, Inc., the world’s leading provider of TLS/SSL and PKI solutions, has announced that it is now issuing Verified Mark Certificates, compliant with the BIMI standard and available for purchase at scale via DigiCert CertCentral®, DigiCert partners and at www.digicert.com. VMCs issued by DigiCert enable companies to add their trademarked logos to emails they send to their customers to increase…
-

Comments by: Jonathan Knudsen, Senior Security Strategist, Synopsys Software Integrity Group As details about the single largest ransomware attack continue to emerge, questions will be asked. Will the ransom be paid? Can organisations recover their data? What kind of damage will this cause? The only question that matters is: how can a problem like this…
-

ESET Research has recently uncovered a new and still active campaign that uses more advanced versions of the old crimeware Bandook to spy on its victims. The ongoing campaign is targeting corporate networks in Spanish-speaking countries, with 90% of ESET telemetry detections in Venezuela. ESET researchers have found new functionality and changes to Bandook. Because…
-

Comments by: Lotem Finkelstein, Head of Threat Intelligence, Check Point Software Technologies Ransomware attacks have grown over the last 12 months by 93%, according to Check Point Research. North America saw a 32% increase of attacks in the last six months. I don’t think we’ve seen the peak for ransomware attacks. The influx of these breaches are…
-

Comments by: Tim Mackey, Principal Security Strategist, Synopsys Software Integrity Group From a user’s perspective, there is no difference between a data breach where company servers were hacked and someone misusing an API to obtain their data. Data loss is data loss, and attackers will find the simplest way to obtain the data they need…
-

From robot companions to AI choosing the perfect partner, technology has become permanently entwined with dating and finding love, especially after a year and a half of lockdown that made digital connections the only type possible. To understand the security implications of this trend, Kaspersky researchers conducted an in-depth study of nine popular dating apps…
-

Comments by: Yaniv Balmas, Head of Cyber Research at Check Point Software Technologies Most users likely assume that the processing of Voila app is done locally on their phone. This is not the case. A non-obvious fact here is that the company sends face pictures to its servers for processing. When a face photo is…
-

Comments by: Eric Nagel, General Manager for APAC at Cybereason “There are many weaknesses in supply chain security. Public and private sector organizations alike are not tamper-proof in today’s world. Living with a post breach mindset is essential for all companies as incidents will happen and identifying and stopping risks in real time is the…

You must be logged in to post a comment.