Category: Uncategorized

Three Big Companies Working On Passwordless Login Options

ICYMI: Ask just about any IT security professional and they will tell you that weak user passwords are one of the biggest problems and most persistent threats to corporate networks. Despite years of …http://dlvr.it/SRW7BJ

Held to Ransom: 1,200 Unsecured Elasticsearch Databases

ICYMI: Finding, Deleting and Ransoming Cloud Databases Remains Easy, Researchers Warn Memo to IT administrators: If you store data in the cloud in an unsecure manner, expect extortionists to come calling. To wit, security researchers at Secureworks recently found more than 1,200 cloud-based, unsecured Elasticsearch databases that had been forcibly encrypted, leaving only a ransom…
Read more

Carinthia, Austria Approves Ransomware Recovery Plans

500,000 Euros Budgeted to Restore Affected Systems, Boost Cybersecurity In the aftermath of the BlackCat ransomware attack on May 24, 2022, that “severely affected” government services in Carinthia, the Austrian state has budgeted 500,000 euros to restore services and boost its cybersecurity and reinstated its passport issuance system, which was affected by the attack.http://dlvr.it/SRSRnW

New Method Hides Malware In Windows Event Logs

At least one group of hackers has learned a new trick you need to be aware of.  Security researchers at Kapersky Lab have discovered a malicious campaign-in-progress that is using event logs …http://dlvr.it/SRRrtL

Held to Ransom: 1,200 Unsecured Elasticsearch Databases

Finding, Deleting and Ransoming Cloud Databases Remains Easy, Researchers Warn Memo to IT administrators: If you store data in the cloud in an unsecure manner, expect extortionists to come calling. To wit, security researchers at Secureworks recently found more than 1,200 cloud-based, unsecured Elasticsearch databases that had been forcibly encrypted, leaving only a ransom note.http://dlvr.it/SRR8fm

CISA Adds 75 Flaws to Known Vulnerability Catalog in 3 Days

ICYMI: Many Listed Flaws Previously Disclosed, Some More Than A Decade Old The U.S. Cybersecurity and Infrastructure Security Agency has added 75 flaws to its catalog of known exploited software vulnerabilities. They were disclosed in three separate batches of 21, 20 and 34 vulnerabilities on Monday, Tuesday and Wednesday respectively.http://dlvr.it/SRNy9p