Security
Headlines
HeadlinesLatestCVEs

Source

DARKReading

Nokia: No Evidence So Far That Hackers Breached Company Data

The mobile device maker continues to investigate IntelBroker's claims of another high-profile data breach, with the cybercriminal group posting on BreachForums internal data allegedly stolen from Nokia through a third-party contractor.

DARKReading
#apple#cisco#intel#nokia#auth#ssh
How to Outsmart Stealthy E-Crime and Nation-State Threats

In a time of increasingly sophisticated cross-domain attacks, relying solely on automated solutions isn't enough.

How Playing Cyber Games Can Help You Get Hired

When it comes to landing a job in cybersecurity, what does it take to stand out from the pack? Try playing games.

Canadian Authorities Arrest Attacker Who Stole Snowflake Data

The suspect, tracked as UNC5537, allegedly bragged about hacking several Snowflake victims on Telegram, drawing attention to himself.

Attacker Hides Malicious Activity in Emulated Linux Environment

The CRON#TRAP campaign involves a novel technique for executing malicious commands on a compromised system.

Android Botnet 'ToxicPanda' Bashes Banks Across Europe, Latin America

Chinese-speaking adversaries are using a fresh Android banking Trojan to take over devices and initiate fraudulent money transfers from financial institutions across Latin America, Italy, Portugal, and Spain.

Schneider Electric Clawed by 'Hellcat' Ransomware Gang

The cybercriminal group holding the stolen information is demanding the vendor admit to the breach and pay up.

Docusign API Abused in Widescale, Novel Invoice Attack

Attackers are exploiting the "Envelopes: create API" of the enormously popular document-signing service to flood corporate inboxes with convincing phishing emails aimed at defrauding organizations. It's an unusual attack vector with a high success rate.

Oh, the Humanity! How to Make Humans Part of Cybersecurity Design

Government and industry want to jump-start the conversation around "human-centric cybersecurity" to boost the usability and effectiveness of security products and services.

How to Win at Cyber by Influencing People

Zero trust is a mature approach that will improve your organization's security.