Security News > 2021

There are ways to reduce dark data and the risks that come with it. "Once discovered, dark data is no longer dark data."

Many employers are now offering digital security benefits to help protect their employees. Digital security benefits seek to protect employees from online predators engaging in attempted identity theft or the harvesting of credentials/account information.

Users of QNAP network-attached storage devices are reporting attacks on their systems with the eCh0raix ransomware, also known as QNAPCrypt. BleepingComputer forum users managing QNAP and Synology NAS systems have been regularly reporting eCh0raix ransomware attacks but more of them started to disclose incidents around December 20.

Microsoft has confirmed a new issue impacting devices running Windows 11, version 21H2, where apps using Win32 APIs to render colors on some high dynamic range displays may not work as expected. HDR displays come with a notably increased range of color because they support a wider color gamut, resulting in more vivid colors than standard dynamic range ones, a well as more precise colors due to added support for more color shades.

Microsoft has confirmed a new issue impacting devices running Windows 11, version 21H2, where apps using Win32 APIs to render colors on some high dynamic range displays may not work as expected. HDR displays come with a notably increased range of color because they support a wider color gamut, resulting in more vivid colors than standard dynamic range ones, a well as more precise colors due to added support for more color shades.

Photography and personalized photo giant Shutterfly has suffered a Conti ransomware attack that allegedly encrypted thousands of devices and stole corporate data. On Friday, a source told BleepingComputer that Shutterfly suffered a ransomware attack approximately two weeks ago by the Conti gang, who claims to have encrypted over 4,000 devices and 120 VMware ESXi servers.

For security teams scrambling to secure their organizations against Log4j exploitation, one of the first and most challenging tasks is understanding where Log4j exists within their environment. Still, even missing one vulnerable instance of Log4j can leave an organization at risk, which is why discovery is one of the most important steps in the remediation process.

The year-end holiday season is a time for celebration - a chance to decorate homes, splurge on gifts and gather with family and friends. Last year, 1 in 4 people fell victim to fraud during the holiday season.

By integrating security solutions with IoT devices, device manufacturers will be able to provide customers with real-time protection from threats. IoT devices built on legacy technology without proper security protocols in place remain soft targets ripe for exploitation.

Web app attacks against UK businesses have increased by 251% since October 2019, putting both organizations and consumers at risk, an Imperva reserach reveals. In a study of nearly 4.7 million web application-related cyber security incidents, Imperva Research Labs finds that attacks are increasing, on average, by 22% each quarter.