Category: News

Takeaways from the Colonial Pipeline Ransomware Attack

Hank Schless, senior manager of security solutions at Lookout, notes basic steps that organizations can take to protect themselves as ransomware gangs get smarter.

Euros-Driven Football Fever Nets Dumb Passwords

The top easy-to-crack, football-inspired password in a database of 1 billion unique, clear-text, breached passwords? You probably guessed it: “Football.”

5 Tips to Prevent and Mitigate Ransomware Attacks

Ransomware attacks are increasing in frequency, and the repercussions are growing more severe than ever. Here are 5 ways to prevent your company from becoming the next headline.

Researchers: Booming Cyber-Underground Market for Initial-Access Brokers

Ransomware gangs are increasingly buying their way into corporate networks, purchasing access from ‘vendors’ that have previously installed backdoors on targets.

Avaddon Ransomware Gang Evaporates Amid Global Crackdowns  

Ransomware group releases decryptors for nearly 3,000 victims, forfeiting millions in payouts.    

Peloton Bike+ Bug Gives Hackers Complete Control

An attacker with initial physical access (say, at a gym) could gain root entry to the interactive tablet, making for a bevy of remote attack scenarios.

Millions of Connected Cameras Open to Eavesdropping

A supply-chain component lays open camera feeds to remote attackers thanks to a critical security vulnerability.

Malicious PDFs Flood the Web, Lead to Password-Snarfing

SolarMarker makers are using SEO poisoning, stuffing thousands of PDFs with tens of thousands of pages full of SEO keywords & links to redirect to the malware.

Microsoft Disrupts Large-Scale, Cloud-Based BEC Campaign

Varied cloud infrastructure was used to phish email credentials, monitor for and forward finance-related messages and automate operations.

Insider Risks In the Work-From-Home World

Forcepoint’s Michael Crouse talks about risk-adaptive data-protection approaches and how to develop a behavior-based approach to insider threats and risk, particularly with pandemic-expanded network perimeters.