Cisco Confirms Data Breach, Hacked Files Leaked
Cisco has confirmed a breach of its network, where the attacker used voice phishing to convince an employee to accept a malicious multifactor authentication (MFA) push. The breach resulted...
6 Things Every CISO Should Do the First 90 Days on the Job
Not too long ago, the role of chief information security officer was a purely technical position designed to help an organization overcome cybersecurity challenges. Today, however, the CISO role...
5 Easy Steps to Bypass Google Pixel Lock Screens
The November 2022 Android update includes a remediation for a bug that could allow an attacker to bypass the Google Pixel lock screen. The researcher behind the discovery, David Schütz, reported...
FBI: Bank Losses From BEC Attacks Top $43B
Between June 2016 and December 2021, the total losses reported by global financial institutions as a result of business email compromise (BEC) attacks clocked in at more than $43 billion.
The...
Oracle Fusion Middleware Flaw Flagged by CISA
A critical bug in Oracle's Fusion Middleware Access Manager has landed on the Cybersecurity and Infrastructure Security Agency's list of known exploited vulnerabilities. The critical flaw, tracked under CVE-2021-35587, could...
Amid Sweeping Change, Cyber Defenders Face Escalating Visibility — and Pressure
The past two years have marked a host of changes for cybersecurity professionals, as the pandemic, the ransomware tsunami, and increasing political and regulatory scrutiny have all created mounting...
Malicious Chrome Extensions Plague 1.4M Users
Researchers have flagged five separate malicious Chrome extensions masquerading as Netflix viewers and more. They track user activity and insert code into any e-commerce sites they visit, letting cyberattackers steal payments...
Microsoft: Russia Using Cyberattacks in Coordination With Military Invasion of Ukraine
In apparent orchestrated coordination with military operations against Ukraine, six Russian state-supported threat actors have targeted civilian infrastructure inside the country with more than 237 individual cyber operations, according to...
Chinese APT Bronze President Mounts Spy Campaign on Russian Military
China's tacit support for Russia's war in Ukraine apparently doesn't preclude likely China-backed cyber actors from mounting espionage campaigns on the Russian military.
Researchers from Secureworks' Counter Threat Unit this...
REvil Revival: Are Ransomware Gangs Ever Really Gone?
Evidence that members of the defunct REvil group may be reviving the ransomware gang continues to accumulate, but cybersecurity experts question whether the group will have the same impact...