Day: October 2, 2021

Arctic Wolf expands its security awareness and training program with Habitu8

Arctic Wolf announced the advancement of Arctic Wolf Managed Security Awareness with the acquisition of training platform Habitu8. Managed Security Awareness is the latest addition to the Arctic Wolf Security Operations platform, a security awareness and training program delivered as a concierge service. Co-founded in 2017 by security awareness and training expert, Jason Hoenich, Habitu8 …

Arctic Wolf expands its security awareness and training program with Habitu8 Read More »

Bitdefender expands marketing leadership with two key appointments

Bitdefender announced two key additions to its marketing leadership. Dennis Goedegebuure joins the Consumer Solutions Group as Vice President of Global New Customer Acquisition, while Amy Blackshaw joins the Business Solutions Group as Vice President of Product and Technical Marketing. Both bring extensive experience building and leading high performance product and marketing teams. “Dennis and …

Bitdefender expands marketing leadership with two key appointments Read More »

Android flubot malware installs itself by faking security update

The security update is obviously phony but looks authentic that can deceive users into installing Flubot malware on their devices. New Zealand’s Computer Emergency Response Team (Cert NZ) has issued a new warning involving the spread and infection of the infamous Flubot malware known for its password stealing capabilities. According to authorities, the threat actors …

Android flubot malware installs itself by faking security update Read More »

Sandhills online machinery markets shut down by ransomware attack

Industry publication giant Sandhills Global has suffered a ransomware attack, causing hosted websites to become inaccessible and disrupting their business operations. Sandhills Global is a US-based trade publication and hosting company catering to the transportation, agriculture, aircraft, heavy machinery, and technology industries. Sandhills publishes various printed and hosted trade publications containing industry news and a marketplace …

Sandhills online machinery markets shut down by ransomware attack Read More »

LeakDB – Web-Scale NoSQL Idempotent Cloud-Native Big-Data Serverless Plaintext Credential Search

LeakDB is a tool set designed to allow organizations to build and deploy their own internal plaintext “Have I Been Pwned”-like service. The LeakDB tool set can normalize, deduplicate, index, sort, and search leaked data sets on the multi-terabyte-scale, without the need to distribute large files to individual users. Once curated, LeakDB can search terabytes …

LeakDB – Web-Scale NoSQL Idempotent Cloud-Native Big-Data Serverless Plaintext Credential Search Read More »

Best Practices to Secure Joomla Website

With the growing popularity of e-commerce stores, which offer an easy shopping experience for customers, comes the need to have a more fitting website to connect with your audience.  Joomla is a CMS (content management system) platform that you may want to use to build your online store. In addition, it has many e-Commerce extensions, …

Best Practices to Secure Joomla Website Read More »

Multi-Factor Authentication and Authenticator Apps

October is Cybersecurity Awareness Month so in this episode we discuss multi-factor authentication and the use of authenticator apps. Multi-factor authentication is one of the most important things that you can enable to secure your online accounts but its unfortunately overlooked by most people. Listen to this episode to learn what multi-factor authentication is, all …

Multi-Factor Authentication and Authenticator Apps Read More »

How to Encrypt Internet Connection in 2021 – Top Five Methods

There has been an increased uptake of remote working following a global pandemic that disrupted normal office-based work methods. Currently, at least 16% of organizations worldwide are fully remote, whereas experts predict that 73% of companies will allow employees to work remotely by 2028. In a remote working setting, employees not only require a strong …

How to Encrypt Internet Connection in 2021 – Top Five Methods Read More »

Revealed: How Solana-based NFT project stole $130,000 USD from users

Enthusiasts of virtual assets and non-fungible tokens (NFT) face all sorts of fraud risks, even from seemingly legitimate platforms. Such seems to be the case with Iconics, a Solana-based NFT project, which is being accused of defrauding its investors of more than $130,000 USD. In theory, the Iconics project consisted of 8,000 NFTs of a …

Revealed: How Solana-based NFT project stole $130,000 USD from users Read More »

Threat actors exploit a flaw in Coinbase 2FA to steal user funds

Threat actors stole funds from the accounts of more than 6,000 users of the crypto exchange Coinbase exploiting a flaw to bypass 2FA authentication. Threat actors have exploited a vulnerability in the SMS-based two-factor authentication (2FA) system implemented by the crypto exchange Coinbase to steal funds from more than 6,000 users. According to a data …

Threat actors exploit a flaw in Coinbase 2FA to steal user funds Read More »

Academics discover hidden layer in China’s Great Firewall

A team of academics from the University of Maryland has discovered a previously hidden layer in China’s Great Firewall censorship system. Introduced in the late 90s, the Great Firewall (GFW) is a system of middleboxes installed at China’s internet exchange points and internet service providers that allow the government to intercept internet traffic, sniff on …

Academics discover hidden layer in China’s Great Firewall Read More »

NSA and CISA Published Cheat Sheet for Selecting and Hardening Remote Access VPN

Virtual Private Networks (VPNs) are quite famous, as they enable users to remotely correlate to a corporate network through an unharmed as well as a protected tunnel. But, sometimes this fails to protect users fully, and that’s why NSA and CISA have jointly published a cheat sheet for selecting and hardening the remote access VPN. …

NSA and CISA Published Cheat Sheet for Selecting and Hardening Remote Access VPN Read More »

How the most richest & dangerous hacker killed a hospitalized baby girl using ransomware

Ransomware infections can have disastrous consequences for victims for both victims and threat actors. An example of this is the case of Teiranni Kidd, a woman who gave birth to a baby girl in 2019 without knowing that the hospital where she gave birth was recovering from a severe malware infection that led to the …

How the most richest & dangerous hacker killed a hospitalized baby girl using ransomware Read More »

Hackers exploit 2FA flaw to steal crypto from 6,000 Coinbase users

Coinbase is working to reimburse the customers for the funds they have lost and help them regain control of their accounts. Coinbase Global Inc. has sent a breach notification letter to its customers affected by the cyberattack on the widely used cryptocurrency exchange. As per the letter, hackers managed to steal accounts of at least …

Hackers exploit 2FA flaw to steal crypto from 6,000 Coinbase users Read More »

Two Weeks Later: Finding and Eliminating Long Tail Latencies

A little over two weeks ago, we shared extensive benchmarking results of edge networks all around the world.  It showed that on a range of tests (TCP connection time, time to first byte, time to last byte), and on a range of measurements (p95, mean), that Cloudflare had some impressive network performance. But we weren’t …

Two Weeks Later: Finding and Eliminating Long Tail Latencies Read More »

Flubot Android banking Trojan spreads via fake security updates

The Flubot Android malware is now leveraging fake security updates warning to trick users into installing the malicious code. Threat actors behind the Flubot Android malware are now leveraging fake security updates to trick victims into installing the malicious code. The attackers use fake security warnings of Flubot infections and urging them to install the …

Flubot Android banking Trojan spreads via fake security updates Read More »

Ruby updates code of conduct to promote inclusion

Maintainers behind the Ruby programming language have revised the project’s Code of Conduct on GitHub to remove tolerating opposing viewpoints as a prerequisite. The decision comes after a community member was seen posting a joke that many deemed sexist and ageist. Tolerance for opposing views no longer enforced Ruby’s Code of Conduct has historically stated that …

Ruby updates code of conduct to promote inclusion Read More »