Industrial control systems (ICS) are specific kinds of assets and associated instrumentation that help to oversee industrial processes. According to the National Institute of Standards and Technology, there are three common types of ICS. These are supervisory control and data acquisition (SCADA) systems, which help organizations to control dispersed assets;
When an unfortunate event occurs, people tend to be curious about who was responsible for the event. It can be interesting and helpful to know who your enemy is and what their motives might be. But in cybersecurity, the primary focus is ultimately on preventative and detective measures to avoid similar issues.Let’s use a recent example to illustrate this poi
In August, Malwarebytes Labs analyzed the damage caused by COVID-19 to business cybersecurity. Because of immediate, mandated transitions to working from home (WFH), businesses across the United States suffered more data breaches, lost more dollars, and increased their overall attack surfaces, all while experiencing a worrying lack of cybersecurity awareness
A ransomware attack that targeted the offices of the City of Knoxville, Tennessee, forced to shut down its entire computer network.
The city of Knoxville, Tennessee, has shut down its computer network following a ransomware attack.
The attack took place in the night between June 10 and June 11, the malware encrypted multiple systems in the IT network.
Cisco Talos experts released technical details on a recently addressed vulnerability in Firefox that could be exploited for code execution.
Security experts from Cisco Talos have released technical details on a recently addressed vulnerability in Firefox, tracked as CVE-2020-12405, that could be exploited by attackers for remote code execution.
The iss
Japanese gaming giant Nintendo has confirmed that hackers have breached 300,000 accounts since early April, financial data were not exposed.
The Japanese video game giant Nintendo has admitted that threat actors have breached 300,000 accounts since early April. The hackers have gained access to personal information, including birthday and email address, b
Hackers are targeting executives of a German multinational corporation involved in the government supply of personal protective equipment (PPE) against COVID-19.
Hackers are targeting executives of a German multinational corporation involved in the government supply of personal protective equipment (PPE).
Threat actors are targeting executives of a Ger
The Indian video on demand giant ZEE5 has been hacked, attackers are threatening to sell the database on the cybercrime underground markets.
A hacker that goes online with the moniker “John Wick” and “Korean Hackers” claim to have hacked the Indian video on demand giant ZEE5 and now is threatening to sell the database on cybercrime
A Chinese threat actor tracked as Cycldek (aka Goblin Panda, or Conimes) has developed new tool to steal information from air-gapped systems.
Security experts from Kaspersky Lab reported that the Chinese threat actor tracked as Cycldek (aka Goblin Panda, or Conimes) has developed new tool to steal information from air-gapped systems.
The Cycldek gr
This week Apple released security patches to address the CVE-2020-9859 zero-day vulnerability that had been used to jailbreak iPhones devices.
Apple released security patches to address the CVE-2020-9859 zero-day vulnerability in the iOS kernel that had been used to jailbreak iPhones.
The flaw was discovered by a team of cyber-security researchers and
VMware has released an update to address a privilege escalation flaw in VMware for the macOS version of Fusion that was introduced by a previous patch.
In March, VMware patched a high-severity privilege escalation vulnerability (CVE-2020-3950) in Fusion, Remote Console (VMRC) and Horizon Client for Mac.
The CVE-2020-3950 is a privilege escalation vuln
This post includes the details of the Coronavirus-themed attacks launched from May 24 to May 30, 2020.
Threat actors exploit the interest in the Coronavirus outbreak while infections increase worldwide, experts are observing new campaigns on a daily bases.
Below a list of attacks detected this week.
May 26 – Hangzhou could permanently adopt CO
A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from Security Affairs free for you in your email box.
Experts observed a spike in COVID-19 related malspam emails containing GuLoaderSilent Night Zeus botnet available for sale in underground forumsThe Florida Unemployment System suffered a data breachVoter
Researchers at ZLab spotted a new phishing campaign using Covid19 lures to spread Himera and Absent-Loader.
Introduction
During our Cyber Defense monitoring activities we intercepted waves of incoming emails directed to many companies under our protective umbrella. These messages were leveraging FMLA (Family and Medical Leave Act) requests related to
Security experts from Cyble discovered in the dark web a database containing details of over 20 Million Taiwanese citizens.
A few weeks ago, threat intelligence firm Cyble discovered in the dark web a database containing details of over 20 Million Taiwanese citizens.
According to the experts, the leak includes government data of an entire country, it w
Announce
Share high-quality web security related articles with you:)