Cybersecurity

Cybersecurity Threats & Attacks

Given the sophistication of cyber-attacks, cybersecurity has become a central focus to protect people and their personal data. Learn more about the common cyber threats we all face in an age when companies are undergoing a digital transformation.

Top news of the week: 11.11.2022.

#infosec
#cybersecurity
#hacking
#phishing
#malware
#decentralized
#remoteworking
#healthcare
#semiconducter
#ITsecurity

@unix_root shared
On Nov 9, 2022
A number of recent #phishing campaigns using the #decentralized Interplanetary Filesystem (IPFS) network to host #malware, phishing kit infrastructure and facilitate other attacks. Details: https://t.co/A9lDEdNVud #infosec #cybersecurity #hacking
Open
Several Cyber Attacks Observed Leveraging IPFS Decentralized Network

Several Cyber Attacks Observed Leveraging IPFS Decentralized Network

A number of phishing campaigns using the decentralized Interplanetary Filesystem (IPFS) network to host malware, phishing kit infrastructure and facil

@EduardKovacs shared
On Nov 8, 2022
The BlogXX/REvil ransomware gang has threatened to publish stolen Medibank customer information shortly after the insurer said it will not pay a ransom. https://t.co/YlFyeGB0Om
Open
Ransomware Gang Threatens to Publish Medibank Customer Information

Ransomware Gang Threatens to Publish Medibank Customer Information

The BlogXX/REvil ransomware gang has threatened to publish stolen Medibank customer information shortly after the insurer said it will not pay a ransom.

@threatintel shared
On Nov 10, 2022
Cloud9: Malicious extension lets attackers remotely take over browser sessions https://t.co/6QekIsNlke
Open
Cloud9 Malware Offers a Paradise of Cyberattack Methods

Cloud9 Malware Offers a Paradise of Cyberattack Methods

The Swiss Army knife-like browser extension is heaven for attackers — and can be hell for enterprise users.

@EduardKovacs shared
On Nov 10, 2022
A ransomware group is offering stolen Continental data for $50 million after the car parts giant confirms theft of files. https://t.co/HfvMjad0F8
Open
Ransomware Gang Offers to Sell Files Stolen From Continental for $50 Million

Ransomware Gang Offers to Sell Files Stolen From Continental for $50 Million

A ransomware group is offering stolen Continental data for $50 million after the car parts giant confirms theft of files.

@kaspersky shared
On Nov 9, 2022
From the #semiconducter shortage to #ransomware and and #remoteworking - we asked what cyber-security experts think will be the main focus for 2023 and beyond. Read the full report 👇 https://t.co/1tSKxdWPyq
Open
Cybersecurity threats: what awaits us in 2023?

Cybersecurity threats: what awaits us in 2023?

We invited notable experts to share their insights and unbiased opinions on what we should expect from cybersecurity in the following year.

@SCMagazine shared
On Nov 10, 2022
In this commentary, @ordrofthings's Greg Murphy says that while device manufacturers need to design robust security into all IoMT devices, healthcare providers must also take responsibility for device security. #healthIT #cybersecurity #infosec #ITsecurity https://t.co/49ScP8rLuC
Open
Six ways healthcare organizations can improve connected device security

Six ways healthcare organizations can improve connected device security

In its Cyber Insecurity in Healthcare: The Cost and Impact on Patient Safety and Care study for security company Proofpoint, the Ponemon Institute found that most hospitals …

@securityaffairs shared
On Nov 9, 2022
@sonoclaudio @marcogovoni @nuke86 Un onore per me essere citato dal prestigioso Financial Times What #Ukraine’s cyber defence tactics can teach other nations https://t.co/tCkYDOw5h1 #securityaffairs #hacking
Open
What Ukraine’s cyber defence tactics can teach other nations

What Ukraine’s cyber defence tactics can teach other nations

Security experts are surprised that Russia’s attacks have not been more effective

@SCMagazine shared
On Nov 8, 2022
.@HHSGov details the three phases of an attack, as well as the aftermath for #healthcare providers to review. The report also contains a list of commonly exploited vulnerabilities that should be immediately patched or segmented from the network. https://t.co/RET809gtty
Open
Iranian actors targeting healthcare via spear-phishing, vulnerability exploit

Iranian actors targeting healthcare via spear-phishing, vulnerability exploit

The insights detail the three phases of an attack, as well as the aftermath for providers to review. The report also contains a list of commonly exploited vulnerabilities that should be ...