Category: News

High-Severity Intel Processor Bug Exposes Encryption Keys

CVE-2021-0146, arising from a debugging functionality with excessive privileges, allows attackers to read encrypted files.

Cybercriminals Target Alibaba Cloud for Cryptomining, Malware

Malicious groups disable features in Alibaba Cloud ECS instances for Monero cryptojacking, according to Trend Micro researchers.

FBI Says Its System Was Exploited to Email Fake Cyberattack Alert

The alert was mumbo jumbo, but it was indeed sent from the bureau’s email system, from the agency’s own internet address.

Threat from Organized Cybercrime Syndicates Is Rising

Europol reports that criminal groups are undermining the EU’s economy and its society, offering everything from murder-for-hire to kidnapping, torture and mutilation.

Costco Confirms: A Data Skimmer’s Been Ripping Off Customers

Big-box behemoth retailer Costco is offering victims 12 months of credit monitoring, a $1 million insurance reimbursement policy and ID theft recovery services.

Top 10 Cybersecurity Best Practices to Combat Ransomware

Immutable storage and more: Sonya Duffin, data protection expert at Veritas Technologies, offers the Top 10 steps for building a multi-layer resilience profile.

Windows 10 Privilege-Escalation Zero-Day Gets an Unofficial Fix

Researchers warn that CVE-2021-34484 can be exploited with a patch bypass for a bug originally addressed in August by Microsoft.

Mac Zero Day Targets Apple Devices in Hong Kong

Google researchers have detailed a widespread watering-hole attack that installed a backdoor on Apple devices that visited Hong Kong-based media and pro-democracy sites.

Millions of Routers, IoT Devices at Risk from New Open-Source Malware

BotenaGo, written in Google’s Golang programming language, can exploit more than 30 different vulnerabilities.

Invest in These 3 Key Security Technologies to Fight Ransomware

Ransomware volumes are up 1000%. Aamir Lakhani, cybersecurity researcher and practitioner at FortiGuard Labs , discusses secure email, network segmentation and sandboxing for defense.